{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2018-1279","title":"Title"},{"category":"description","text":"Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on any server in the MQ cluster can use this cookie to gain full control over the entire cluster.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2018-1279","url":"https://www.suse.com/security/cve/CVE-2018-1279"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1119372 for CVE-2018-1279","url":"https://bugzilla.suse.com/1119372"}],"title":"SUSE CVE CVE-2018-1279","tracking":{"current_release_date":"2025-04-25T07:26:15Z","generator":{"date":"2023-02-15T04:34:23Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2018-1279","initial_release_date":"2023-02-15T04:34:23Z","revision_history":[{"date":"2023-02-15T04:34:23Z","number":"2","summary":"Current version"},{"date":"2025-01-01T08:07:45Z","number":"3","summary":"Current version"},{"date":"2025-02-18T07:20:11Z","number":"4","summary":"Current version"},{"date":"2025-03-15T12:46:29Z","number":"5","summary":"Current version"},{"date":"2025-04-25T07:26:15Z","number":"6","summary":"Current version"}],"status":"interim","version":"6"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"HPE Helion OpenStack 8","product":{"name":"HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8","product_identification_helper":{"cpe":"cpe:/o:suse:hpe-helion-openstack:8"}}},{"category":"product_name","name":"SUSE Enterprise Storage 4","product":{"name":"SUSE Enterprise Storage 4","product_id":"SUSE Enterprise Storage 4","product_identification_helper":{"cpe":"cpe:/o:suse:ses:4"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 7","product":{"name":"SUSE OpenStack Cloud 7","product_id":"SUSE OpenStack Cloud 7","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:7"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 8","product":{"name":"SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:8"}}},{"category":"product_name","name":"SUSE OpenStack Cloud Crowbar 8","product":{"name":"SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud-crowbar:8"}}},{"category":"product_version","name":"rabbitmq-server","product":{"name":"rabbitmq-server","product_id":"rabbitmq-server","product_identification_helper":{"cpe":"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/rabbitmq-server@?upstream=rabbitmq-server.src.rpm"}}},{"category":"product_version","name":"rabbitmq-server-plugins","product":{"name":"rabbitmq-server-plugins","product_id":"rabbitmq-server-plugins","product_identification_helper":{"cpe":"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/rabbitmq-server-plugins@?upstream=rabbitmq-server.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"rabbitmq-server as component of HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8:rabbitmq-server"},"product_reference":"rabbitmq-server","relates_to_product_reference":"HPE Helion OpenStack 8"},{"category":"default_component_of","full_product_name":{"name":"rabbitmq-server-plugins as component of HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8:rabbitmq-server-plugins"},"product_reference":"rabbitmq-server-plugins","relates_to_product_reference":"HPE Helion OpenStack 8"},{"category":"default_component_of","full_product_name":{"name":"rabbitmq-server as component of SUSE Enterprise Storage 4","product_id":"SUSE Enterprise Storage 4:rabbitmq-server"},"product_reference":"rabbitmq-server","relates_to_product_reference":"SUSE Enterprise Storage 4"},{"category":"default_component_of","full_product_name":{"name":"rabbitmq-server as component of SUSE OpenStack Cloud 7","product_id":"SUSE OpenStack Cloud 7:rabbitmq-server"},"product_reference":"rabbitmq-server","relates_to_product_reference":"SUSE OpenStack Cloud 7"},{"category":"default_component_of","full_product_name":{"name":"rabbitmq-server-plugins as component of SUSE OpenStack Cloud 7","product_id":"SUSE OpenStack Cloud 7:rabbitmq-server-plugins"},"product_reference":"rabbitmq-server-plugins","relates_to_product_reference":"SUSE OpenStack Cloud 7"},{"category":"default_component_of","full_product_name":{"name":"rabbitmq-server as component of SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8:rabbitmq-server"},"product_reference":"rabbitmq-server","relates_to_product_reference":"SUSE OpenStack Cloud 8"},{"category":"default_component_of","full_product_name":{"name":"rabbitmq-server-plugins as component of SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8:rabbitmq-server-plugins"},"product_reference":"rabbitmq-server-plugins","relates_to_product_reference":"SUSE OpenStack Cloud 8"},{"category":"default_component_of","full_product_name":{"name":"rabbitmq-server as component of SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8:rabbitmq-server"},"product_reference":"rabbitmq-server","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 8"},{"category":"default_component_of","full_product_name":{"name":"rabbitmq-server-plugins as component of SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8:rabbitmq-server-plugins"},"product_reference":"rabbitmq-server-plugins","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 8"}]},"vulnerabilities":[{"cve":"CVE-2018-1279","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-1279"}],"notes":[{"category":"general","text":"Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on any server in the MQ cluster can use this cookie to gain full control over the entire cluster.","title":"CVE description"}],"product_status":{"known_not_affected":["HPE Helion OpenStack 8:rabbitmq-server","HPE Helion OpenStack 8:rabbitmq-server-plugins","SUSE Enterprise Storage 4:rabbitmq-server","SUSE OpenStack Cloud 7:rabbitmq-server","SUSE OpenStack Cloud 7:rabbitmq-server-plugins","SUSE OpenStack Cloud 8:rabbitmq-server","SUSE OpenStack Cloud 8:rabbitmq-server-plugins","SUSE OpenStack Cloud Crowbar 8:rabbitmq-server","SUSE OpenStack Cloud Crowbar 8:rabbitmq-server-plugins"]},"references":[{"category":"external","summary":"CVE-2018-1279","url":"https://www.suse.com/security/cve/CVE-2018-1279"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1119372 for CVE-2018-1279","url":"https://bugzilla.suse.com/1119372"}],"threats":[{"category":"impact","date":"2018-12-10T22:31:00Z","details":"moderate"}],"title":"CVE-2018-1279"}]}