CVE-2016-9877

NameCVE-2016-9877
DescriptionAn issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3761-1
Debian Bugs849849

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rabbitmq-server (PTS)buster3.7.8-4fixed
buster (security)3.8.2-1+deb10u2fixed
bullseye (security), bullseye3.8.9-3+deb11u1fixed
bookworm, bookworm (security)3.10.8-1.1+deb12u1fixed
sid, trixie3.10.8-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rabbitmq-serversourcewheezy(not affected)
rabbitmq-serversourcejessie3.3.5-1.1+deb8u1DSA-3761-1
rabbitmq-serversource(unstable)3.6.6-1849849

Notes

[wheezy] - rabbitmq-server <not-affected> (Vulnerable code introduced later)
https://pivotal.io/security/cve-2016-9877
https://github.com/rabbitmq/rabbitmq-mqtt/issues/96
https://github.com/rabbitmq/rabbitmq-mqtt/pull/98

Search for package or bug name: Reporting problems