Vulnerability CVE-2016-5017


Published: 2016-09-21

Description:
Buffer overflow in the C cli shell in Apache Zookeeper before 3.4.9 and 3.5.x before 3.5.3, when using the "cmd:" batch mode syntax, allows attackers to have unspecified impact via a long command string.

See advisories in our WLB2 database:
Topic
Author
Date
High
ZooKeeper 3.4.8 / 3.5.2 Buffer Overflow
Lyon Yang
17.09.2016

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Apache -> Zookeeper 

 References:
http://packetstormsecurity.com/files/138755/ZooKeeper-3.4.8-3.5.2-Buffer-Overflow.html
http://www.openwall.com/lists/oss-security/2016/09/17/3
http://www.securityfocus.com/bid/93044
https://git-wip-us.apache.org/repos/asf?p=zookeeper.git;a=commitdiff;h=27ecf981a15554dc8e64a28630af7a5c9e2bdf4f
https://git-wip-us.apache.org/repos/asf?p=zookeeper.git;a=commitdiff;h=f09154d6648eeb4ec5e1ac8a2bacbd2f8c87c14a
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
https://zookeeper.apache.org/security.html#CVE-2016-5017

Copyright 2020, cxsecurity.com

 

Back to Top