Vulnerability identifier: #VU40671
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2015-6524
CWE-ID:
CWE-255
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Fedora
Operating systems & Components /
Operating system
ActiveMQ
Server applications /
Mail servers
Vendor:
Fedoraproject
Apache Foundation
Description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows wildcard operators in usernames, which allows remote attackers to obtain credentials via a brute force attack. NOTE: this identifier was SPLIT from CVE-2014-3612 per ADT2 due to different vulnerability types.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Fedora: 22 - 23
ActiveMQ: 5.0.0, 5.1.0 - 5.10.0, 5.2.0, 5.3.0 - 5.3.2, 5.4.0 - 5.4.3, 5.5.0 - 5.5.1, 5.6.0, 5.7.0, 5.8.0, 5.9.0 - 5.9.1, 22 - 23
External links
https://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt
https://lists.fedoraproject.org/pipermail/package-announce/2015-October/168094.html
https://lists.fedoraproject.org/pipermail/package-announce/2015-October/168651.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.