[ https://issues.apache.org/jira/browse/JAMES-2567?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Tellier Benoit resolved JAMES-2567. ----------------------------------- Resolution: Fixed Fix Version/s: 3.2.0 https://github.com/linagora/james-project/pull/1819 fixed the issue > current RabbmitMQ client (5.3.0) Vulnerability > ---------------------------------------------- > > Key: JAMES-2567 > URL: https://issues.apache.org/jira/browse/JAMES-2567 > Project: James Server > Issue Type: Improvement > Reporter: Trần Tiến Đức > Priority: Major > Fix For: 3.2.0 > > > h5. CVE-2018-11087 [More > information|https://nvd.nist.gov/vuln/detail/CVE-2018-11087](https://nvd.nist.gov/vuln/detail/CVE-2018-11087) > moderate severity > *Vulnerable versions:* >= 5.0.0, < 5.4.0 > *Patched version:* 5.4.0 > Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to > 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname > validation. A malicious user that has the ability to intercept traffic would > be able to view data in transit. -- This message was sent by Atlassian JIRA (v7.6.3#76005) --------------------------------------------------------------------- To unsubscribe, e-mail: server-dev-unsubscr...@james.apache.org For additional commands, e-mail: server-dev-h...@james.apache.org