2 results (0.017 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

16 Jun 2023 — An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments. A flaw was found in librabbitmq. This issue occurs because credentials can only be entered on the command line (for example, for amqp-publish or amqp-consume) and are visible to local attackers by listing a process and its arguments. An upd... • https://github.com/alanxz/rabbitmq-c/issues/575 • CWE-522: Insufficiently Protected Credentials •

CVSS: 9.8EPSS: 2%CPEs: 9EXPL: 0

01 Dec 2019 — An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer. Se detectó un problema en la función amqp_handle_input en el archivo amqp_connection.c en rabbitmq-c versi... • https://github.com/alanxz/rabbitmq-c/blob/master/ChangeLog.md • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •