{"id":"CVE-2019-0222","details":"In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.","aliases":["GHSA-jpv3-g4cc-6vfx"],"modified":"2026-04-10T04:08:27.747221Z","published":"2019-03-28T22:29:00.433Z","references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d%40%3Ccommits.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a%40%3Ccommits.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1%40%3Cdev.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/d1e334bd71d6e68462c62c726fe6db565c7a6283302f9c1feed087fa%40%3Ccommits.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b%40%3Cdev.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc%40%3Ccommits.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/7da9636557118178b1690ba0af49c8a7b7b97d925218b5774622f488%40%3Cusers.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7%40%3Ccommits.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/71640324661c1b6d0b6708bd4fb20170e1b979370a4b8cddc4f8d485%40%3Cdev.activemq.apache.org%3E"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190502-0006/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"http://activemq.apache.org/security-advisories.data/CVE-2019-0222-announcement.txt"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00004.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/03/27/2"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/107622"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/activemq","events":[{"introduced":"38fcc0ce0178d4a6870aa4f68e2b565c1ad0aa6f"},{"last_affected":"bcad7e1f6a6dd078d87787a03b56560e995ef773"}],"database_specific":{"versions":[{"introduced":"5.0.0"},{"last_affected":"5.15.8"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-0222.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.1.0.5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2.0.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"13.3.0.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.1.3.0.0"}]},{"events":[{"introduced":"0"},{"fixed":"19.1.0.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}