CVE-2023-46118

Publication date 25 October 2023

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

4.9 · Medium

Score breakdown

RabbitMQ is a multi-protocol messaging and streaming broker. HTTP API did not enforce an HTTP request body limit, making it vulnerable for denial of service (DoS) attacks with very large messages. An authenticated user with sufficient credentials can publish a very large messages over the HTTP API and cause target node to be terminated by an "out-of-memory killer"-like mechanism. This vulnerability has been patched in versions 3.11.24 and 3.12.7.

Status

Package Ubuntu Release Status
rabbitmq-server 24.10 oracular
Fixed 3.12.1-1ubuntu1
24.04 LTS noble
Fixed 3.12.1-1ubuntu1
23.10 mantic
Fixed 3.12.1-1ubuntu0.1
23.04 lunar
Fixed 3.10.8-1.1ubuntu0.1
22.04 LTS jammy
Fixed 3.9.13-1ubuntu0.22.04.2
20.04 LTS focal
Fixed 3.8.2-0ubuntu1.5
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty Ignored end of standard support

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
rabbitmq-server

Severity score breakdown

Parameter Value
Base score 4.9 · Medium
Attack vector Network
Attack complexity Low
Privileges required High
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-6501-1
    • RabbitMQ vulnerability
    • 21 November 2023

Other references