View | Details | Raw Unified | Return to bug 216026
Collapse All | Expand All

(-)security/vuxml/vuln.xml (+32 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="6aa956fb-d97f-11e6-a071-001e67f15f5a">
62
    <topic>RabbitMQ -- Authentication vulnerability</topic>
63
    <affects>
64
      <package>
65
	<name>rabbitmq</name>
66
	<range><ge>3.0.0</ge><lt>3.5.8</lt></range>
67
	<range><ge>3.6.0</ge><lt>3.6.6</lt></range>
68
      </package>
69
    </affects>
70
    <description>
71
      <body xmlns="http://www.w3.org/1999/xhtml">
72
	<p>Pivotal.io reports:</p>
73
	<blockquote cite="https://pivotal.io/security/cve-2016-9877">
74
	<p>MQTT (MQ Telemetry Transport) connection authentication with a
75
	   username/password pair succeeds if an existing username is
76
	   provided but the password is omitted from the connection
77
	   request. Connections that use TLS with a client-provided
78
	   certificate are not affected.</p>
79
	</blockquote>
80
      </body>
81
    </description>
82
    <references>
83
      <url>https://pivotal.io/security/cve-2016-9877</url>
84
      <url>https://github.com/rabbitmq/rabbitmq-server/releases/tag/rabbitmq_v3_6_6</url>
85
      <cvename>CVE-2016-9877</cvename>
86
    </references>
87
    <dates>
88
      <discovery>2016-12-06</discovery>
89
      <entry>2017-01-13</entry>
90
    </dates>
91
  </vuln>
92
61
  <vuln vid="a93c3287-d8fd-11e6-be5c-001fbc0f280f">
93
  <vuln vid="a93c3287-d8fd-11e6-be5c-001fbc0f280f">
62
    <topic>Ansible -- Command execution on Ansible controller from host</topic>
94
    <topic>Ansible -- Command execution on Ansible controller from host</topic>
63
    <affects>
95
    <affects>

Return to bug 216026