CVE-2017-4966
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2017-4966 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
This issue affects rabbitmq-server plugins as shipped with:
* Red Hat Storage Console 2
* Red Hat Enterprise Linux OpenStack Platform 5,6,7
* Red Hat OpenStack Platform 8,9,10,11
Although RabbitMQ plugins are shipped in these products, no plugins are enabled or used by default.
To verify your environment's plugin usage, run:
rabbitmq-plugins list
A future update may address this issue. Red Hat Product Security has rated this issue as having Moderate security impact. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
CVSS v3 metrics
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
| CVSS3 Base Score | 5.5 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
| Attack Vector | Local |
| Attack Complexity | Low |
| Privileges Required | Low |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity Impact | None |
| Availability Impact | None |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Storage Console 2 | rabbitmq-server | Will not fix |
| Red Hat OpenStack Platform 9.0 | rabbitmq-server | Will not fix |
| Red Hat OpenStack Platform 8.0 (Liberty) | rabbitmq-server | Will not fix |
| Red Hat OpenStack Platform 11.0 (Ocata) | rabbitmq-server | Will not fix |
| Red Hat OpenStack Platform 10 | rabbitmq-server | Will not fix |
| Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 | rabbitmq-server | Will not fix |
| Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 | rabbitmq-server | Will not fix |
| Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) | rabbitmq-server | Will not fix |
External References
CVE description copyright © 2017, The MITRE Corporation
