[ 
https://issues.apache.org/jira/browse/JAMES-2567?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Tellier Benoit resolved JAMES-2567.
-----------------------------------
       Resolution: Fixed
    Fix Version/s: 3.2.0

https://github.com/linagora/james-project/pull/1819 fixed the issue

> current RabbmitMQ client (5.3.0) Vulnerability
> ----------------------------------------------
>
>                 Key: JAMES-2567
>                 URL: https://issues.apache.org/jira/browse/JAMES-2567
>             Project: James Server
>          Issue Type: Improvement
>            Reporter: Trần Tiến Đức
>            Priority: Major
>             Fix For: 3.2.0
>
>
> h5. CVE-2018-11087 [More 
> information|https://nvd.nist.gov/vuln/detail/CVE-2018-11087](https://nvd.nist.gov/vuln/detail/CVE-2018-11087)
> moderate severity
> *Vulnerable versions:* >= 5.0.0, < 5.4.0
> *Patched version:* 5.4.0
> Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 
> 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname 
> validation. A malicious user that has the ability to intercept traffic would 
> be able to view data in transit.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: server-dev-unsubscr...@james.apache.org
For additional commands, e-mail: server-dev-h...@james.apache.org

Reply via email to