{"id":"CVE-2016-4432","details":"The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.","aliases":["GHSA-q66c-h853-gqw2"],"modified":"2026-04-10T03:51:22.624982Z","published":"2016-06-01T20:59:07.093Z","references":[{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/538508/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1035983"},{"type":"ADVISORY","url":"http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E"},{"type":"REPORT","url":"https://issues.apache.org/jira/browse/QPID-7257"},{"type":"FIX","url":"https://svn.apache.org/viewvc?view=revision&revision=1743161"},{"type":"FIX","url":"https://svn.apache.org/viewvc?view=revision&revision=1743393"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/qpid-broker-j","events":[{"introduced":"0"},{"fixed":"379c2669182d054cbf84ad9a252a3624f6228bc2"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.0.3"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-4432.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}