{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2016-03-23T00:00:00.000Z","descriptions":[{"lang":"en","value":"The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-04-23T11:06:04.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://issues.apache.org/jira/browse/PROTON-1157"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html"},{"name":"FEDORA-2016-e6e8436b98","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182414.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git%3Bh=a058585"},{"tags":["x_refsource_CONFIRM"],"url":"http://qpid.apache.org/releases/qpid-proton-0.12.1/release-notes.html"},{"name":"20160323 CVE-2016-2166: Apache Qpid Proton python binding silently ignores request for 'amqps' if SSL/TLS not supported","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/537864/100/0/threaded"},{"name":"[qpid-commits] 20190423 [qpid-site] branch asf-site updated: update site content for CVE-2019-0223","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d%40%3Ccommits.qpid.apache.org%3E"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2016-2166","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://issues.apache.org/jira/browse/PROTON-1157","refsource":"CONFIRM","url":"https://issues.apache.org/jira/browse/PROTON-1157"},{"name":"http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html"},{"name":"FEDORA-2016-e6e8436b98","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182414.html"},{"name":"https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git;h=a058585","refsource":"CONFIRM","url":"https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git;h=a058585"},{"name":"http://qpid.apache.org/releases/qpid-proton-0.12.1/release-notes.html","refsource":"CONFIRM","url":"http://qpid.apache.org/releases/qpid-proton-0.12.1/release-notes.html"},{"name":"20160323 CVE-2016-2166: Apache Qpid Proton python binding silently ignores request for 'amqps' if SSL/TLS not supported","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/537864/100/0/threaded"},{"name":"[qpid-commits] 20190423 [qpid-site] branch asf-site updated: update site content for CVE-2019-0223","refsource":"MLIST","url":"https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d@%3Ccommits.qpid.apache.org%3E"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T23:17:50.750Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.apache.org/jira/browse/PROTON-1157"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html"},{"name":"FEDORA-2016-e6e8436b98","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182414.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git%3Bh=a058585"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://qpid.apache.org/releases/qpid-proton-0.12.1/release-notes.html"},{"name":"20160323 CVE-2016-2166: Apache Qpid Proton python binding silently ignores request for 'amqps' if SSL/TLS not supported","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/537864/100/0/threaded"},{"name":"[qpid-commits] 20190423 [qpid-site] branch asf-site updated: update site content for CVE-2019-0223","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d%40%3Ccommits.qpid.apache.org%3E"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2016-2166","datePublished":"2016-04-12T14:00:00.000Z","dateReserved":"2016-01-29T00:00:00.000Z","dateUpdated":"2024-08-05T23:17:50.750Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}