UBUNTU-CVE-2012-4460

Source
https://ubuntu.com/security/CVE-2012-4460
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-4460.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2012-4460
Upstream
  • CVE-2012-4460
Published
2013-03-14T03:10:00Z
Modified
2026-04-22T09:18:12.012262Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

The serializing/deserializing functions in the qpid::framing::Buffer class in Apache Qpid 0.20 and earlier allow remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors. NOTE: this issue could also trigger an out-of-bounds read, but it might not trigger a crash.

References

Affected packages

Ubuntu:16.04:LTS / qpid-cpp

Package

Name
qpid-cpp
Purl
pkg:deb/ubuntu/qpid-cpp@0.16-9ubuntu2?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.16-9build1
0.16-9ubuntu1
0.16-9ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libqmf1",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqmf2-1",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqmfconsole2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqmfengine1",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpid-perl",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpid-ruby1.8",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidbroker2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidclient2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidcommon2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidmessaging2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidtypes1",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "librdmawrap2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libsslcommon2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "python-cqmf2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "python-cqpid",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "python-qmf",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "python-qmf2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "qmfgen",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "qpid-client",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "qpidd",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "ruby-qpid",
            "binary_version": "0.16-9ubuntu2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-4460.json"