An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3761-1 | rabbitmq-server security update |
EUVD |
EUVD-2016-10668 | An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected. |
Ubuntu USN |
USN-3374-1 | RabbitMQ vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 02 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom rabbitmq Server |
|
| CPEs | cpe:2.3:a:vmware:rabbitmq:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.6:*:*:*:*:*:*:* |
cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.6:*:*:*:*:*:*:* |
| Vendors & Products |
Vmware
Vmware rabbitmq |
Broadcom
Broadcom rabbitmq Server |
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-06T03:07:30.822Z
Reserved: 2016-12-06T00:00:00
Link: CVE-2016-9877
No data.
Status : Deferred
Published: 2016-12-29T09:59:00.790
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-9877
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN