DEBIAN-CVE-2020-13920

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2020-13920
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2020-13920.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2020-13920
Upstream
Published
2020-09-10T19:15:13Z
Modified
2025-09-19T06:05:21Z
Summary
[none]
Details

Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.

References

Affected packages

Debian:11 / activemq

Package

Name
activemq
Purl
pkg:deb/debian/activemq?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.16.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / activemq

Package

Name
activemq
Purl
pkg:deb/debian/activemq?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.16.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / activemq

Package

Name
activemq
Purl
pkg:deb/debian/activemq?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.16.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / activemq

Package

Name
activemq
Purl
pkg:deb/debian/activemq?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.16.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}