UBUNTU-CVE-2016-4432

Source
https://ubuntu.com/security/CVE-2016-4432
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4432.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-4432
Upstream
Published
2016-06-01T20:59:00Z
Modified
2025-10-24T04:45:45Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
  • 9.1 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.

References

Affected packages

Ubuntu:16.04:LTS / qpid-cpp

Package

Name
qpid-cpp
Purl
pkg:deb/ubuntu/qpid-cpp@0.16-9ubuntu2?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.16-9build1
0.16-9ubuntu1
0.16-9ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libqmf-dev",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqmf1",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqmf2-1",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqmf2-dev",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqmfconsole2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqmfconsole2-dev",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqmfengine1",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqmfengine1-dev",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpid-perl",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpid-ruby1.8",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidbroker2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidbroker2-dev",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidclient2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidclient2-dev",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidcommon2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidcommon2-dev",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidmessaging2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidmessaging2-dev",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidtypes1",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libqpidtypes1-dev",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "librdmawrap2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "librdmawrap2-dev",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libsslcommon2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "libsslcommon2-dev",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "python-cqmf2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "python-cqpid",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "python-qmf",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "python-qmf2",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "qmfgen",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "qpid-client",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "qpidd",
            "binary_version": "0.16-9ubuntu2"
        },
        {
            "binary_name": "ruby-qpid",
            "binary_version": "0.16-9ubuntu2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4432.json"