[
https://issues.apache.org/jira/browse/JAMES-2567?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Tellier Benoit resolved JAMES-2567.
-----------------------------------
Resolution: Fixed
Fix Version/s: 3.2.0
https://github.com/linagora/james-project/pull/1819 fixed the issue
> current RabbmitMQ client (5.3.0) Vulnerability
> ----------------------------------------------
>
> Key: JAMES-2567
> URL: https://issues.apache.org/jira/browse/JAMES-2567
> Project: James Server
> Issue Type: Improvement
> Reporter: Trần Tiến Đức
> Priority: Major
> Fix For: 3.2.0
>
>
> h5. CVE-2018-11087 [More
> information|https://nvd.nist.gov/vuln/detail/CVE-2018-11087](https://nvd.nist.gov/vuln/detail/CVE-2018-11087)
> moderate severity
> *Vulnerable versions:* >= 5.0.0, < 5.4.0
> *Patched version:* 5.4.0
> Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to
> 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname
> validation. A malicious user that has the ability to intercept traffic would
> be able to view data in transit.
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]