You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@activemq.apache.org by "ASF subversion and git services (Jira)" <ji...@apache.org> on 2021/12/03 02:16:00 UTC
[jira] [Commented] (ARTEMIS-3593) OOM error on rogue message to Artemis Broker
[ https://issues.apache.org/jira/browse/ARTEMIS-3593?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17452695#comment-17452695 ]
ASF subversion and git services commented on ARTEMIS-3593:
----------------------------------------------------------
Commit 72a4fff1673477d78a85c415d48a2c74afda81fa in activemq-artemis's branch refs/heads/main from Clebert Suconic
[ https://gitbox.apache.org/repos/asf?p=activemq-artemis.git;h=72a4fff ]
ARTEMIS-3593 Defense against OME on parsing XID
Co-authored-by: Viktor Kolomeyko <Vi...@r3.com>
> OOM error on rogue message to Artemis Broker
> --------------------------------------------
>
> Key: ARTEMIS-3593
> URL: https://issues.apache.org/jira/browse/ARTEMIS-3593
> Project: ActiveMQ Artemis
> Issue Type: Bug
> Components: Broker
> Affects Versions: 2.6.2
> Reporter: Viktor Kolomeyko
> Priority: Critical
> Fix For: 2.20.0
>
> Attachments: CrashDump.log, dospayload.binary
>
> Time Spent: 2h 10m
> Remaining Estimate: 0h
>
> A problem been reported by a Security Researcher when a Java process running an embedded Artemis Broker been sent a handcrafted message:
> {code:sh}
> cat /path/to/dospayload.binary > /dev/tcp/<broker_address>/<broker_port>{code}
> resulting OutOfMemory crash, please see attachment.
> The problem is caused by the fact that a 32-bit integer is read from the stream and byte array is allocated using this value without performing any checks.
--
This message was sent by Atlassian Jira
(v8.20.1#820001)