The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames.
activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt
rhn.redhat.com/errata/RHSA-2015-0137.html
rhn.redhat.com/errata/RHSA-2015-0138.html
seclists.org/oss-sec/2015/q1/427
www.securityfocus.com/bid/72513
github.com/apache/activemq
github.com/apache/activemq/commit/22f2f3dde757d31307da772d579815c1d169bc39
issues.apache.org/jira/browse/AMQ-5345
lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E
lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E
nvd.nist.gov/vuln/detail/CVE-2014-3612