CVE-2020-5419

NameCVE-2020-5419
DescriptionRabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rabbitmq-server (PTS)jessie, jessie (lts)3.3.5-1.1+deb8u1fixed
stretch (security)3.6.6-1+deb9u2fixed
stretch (lts), stretch3.6.6+really3.8.9-0+deb9u2fixed
buster (security), buster, buster (lts)3.8.2-1+deb10u2fixed
bullseye (security), bullseye3.8.9-3+deb11u1fixed
bookworm (security), bookworm3.10.8-1.1+deb12u1fixed
sid, trixie3.10.8-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rabbitmq-serversource(unstable)(not affected)

Notes

- rabbitmq-server <not-affected> (Windows-specific vulnerability)

Search for package or bug name: Reporting problems