cvelist/2017/5xxx/CVE-2017-5637.json

96 lines
3.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 22:04:15 +00:00
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2017-10-09T00:00:00",
"ID": "CVE-2017-5637",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache ZooKeeper",
"version": {
"version_data": [
{
"version_value": "3.4.0 to 3.4.9"
},
{
"version_value": "3.5.0 to 3.5.2"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-17 22:04:15 +00:00
"lang": "eng",
"value": "Two four letter word commands \"wchp/wchc\" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later."
2017-10-16 12:31:07 -04:00
}
2019-03-17 22:04:15 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "DOS"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[dev] 20171009 [SECURITY] CVE-2017-5637: DOS attack on wchp/wchc four letter words (4lw)",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370@%3Cdev.zookeeper.apache.org%3E"
},
{
"name": "https://issues.apache.org/jira/browse/ZOOKEEPER-2693",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/ZOOKEEPER-2693"
},
{
"name": "98814",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98814"
},
{
"name": "RHSA-2017:3355",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3355"
},
{
"name": "RHSA-2017:3354",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3354"
},
{
"name": "RHSA-2017:2477",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2477"
},
{
"name": "DSA-3871",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3871"
}
]
}
}