CVE-2017-5637
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
Known Affected Software
14 configuration(s) from 2 vendor(s)
zookeeper
Version:
3.4.5
CPE:
cpe:2.3:a:apache:zookeeper:3.4.5:-:*:*:*:*:*:*
zookeeper
Version:
3.4.2
CPE:
cpe:2.3:a:apache:zookeeper:3.4.2:*:*:*:*:*:*:*
zookeeper
Version:
3.4.0
CPE:
cpe:2.3:a:apache:zookeeper:3.4.0:*:*:*:*:*:*:*
zookeeper
Version:
3.4.6
CPE:
cpe:2.3:a:apache:zookeeper:3.4.6:-:*:*:*:*:*:*
zookeeper
Version:
3.5.0
CPE:
cpe:2.3:a:apache:zookeeper:3.5.0:alpha:*:*:*:*:*:*
zookeeper
Version:
3.5.1
CPE:
cpe:2.3:a:apache:zookeeper:3.5.1:alpha:*:*:*:*:*:*
zookeeper
Version:
3.5.2
CPE:
cpe:2.3:a:apache:zookeeper:3.5.2:alpha:*:*:*:*:*:*
zookeeper
Version:
3.4.4
CPE:
cpe:2.3:a:apache:zookeeper:3.4.4:-:*:*:*:*:*:*
zookeeper
Version:
3.4.8
CPE:
cpe:2.3:a:apache:zookeeper:3.4.8:-:*:*:*:*:*:*
zookeeper
Version:
3.4.9
CPE:
cpe:2.3:a:apache:zookeeper:3.4.9:-:*:*:*:*:*:*
zookeeper
Version:
3.4.1
CPE:
cpe:2.3:a:apache:zookeeper:3.4.1:*:*:*:*:*:*:*
zookeeper
Version:
3.4.3
CPE:
cpe:2.3:a:apache:zookeeper:3.4.3:*:*:*:*:*:*:*
zookeeper
Version:
3.4.7
CPE:
cpe:2.3:a:apache:zookeeper:3.4.7:-:*:*:*:*:*:*
debian_linux
Version:
8.0
CPE:
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
This vulnerability affects 14 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://www.debian.org/security/2017/dsa-3871security@apache.org Third Party Advisory
-
http://www.securityfocus.com/bid/98814security@apache.org Third Party Advisory VDB Entry
-
https://access.redhat.com/errata/RHSA-2017:2477security@apache.org
-
https://access.redhat.com/errata/RHSA-2017:3354security@apache.org
-
https://access.redhat.com/errata/RHSA-2017:3355security@apache.org
-
https://issues.apache.org/jira/browse/ZOOKEEPER-2693security@apache.org Issue Tracking Mitigation Vendor Advisory
-
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3Esecurity@apache.org
-
https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370%40%3Cdev.zookeeper.apache.org%3Esecurity@apache.org
-
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3Esecurity@apache.org
-
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3Esecurity@apache.org
-
https://www.oracle.com//security-alerts/cpujul2021.htmlsecurity@apache.org
-
https://www.oracle.com/security-alerts/cpujul2020.htmlsecurity@apache.org
-
http://www.debian.org/security/2017/dsa-3871af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.securityfocus.com/bid/98814af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
https://access.redhat.com/errata/RHSA-2017:2477af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:3354af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:3355af854a3a-2127-422b-91ae-364da2661108
-
https://issues.apache.org/jira/browse/ZOOKEEPER-2693af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Mitigation Vendor Advisory
-
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370%40%3Cdev.zookeeper.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://www.oracle.com//security-alerts/cpujul2021.htmlaf854a3a-2127-422b-91ae-364da2661108
-
https://www.oracle.com/security-alerts/cpujul2020.htmlaf854a3a-2127-422b-91ae-364da2661108
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-306
Top 25 #16
Missing Authentication for Critical Function
- Description
- The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
- Exploit Likelihood
- High
- Typical Severity
- High
- OWASP Top 10
- A07:2021-Identification/Auth Failures
- Abstraction Level
- Base
Key Information
- Published Date
- October 10, 2017
