[
https://issues.apache.org/jira/browse/ZOOKEEPER-2713?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15902275#comment-15902275
]
Michael Han commented on ZOOKEEPER-2713:
----------------------------------------
First stab on the text:
{noformat}
CVE-2017-5637: DOS attack on wchp/wchc four letter words (4lw)
Severity: moderate
Vendor:
The Apache Software Foundation
Versions Affected:
ZooKeeper 3.4.0 to 3.4.8
ZooKeeper 3.5.0 to 3.5.2
The unsupported ZooKeeper 1.x through 3.3.x versions may be also affected
Note: The 3.5 branch is still alpha at this time.
Description:
Two four letter word commands “wchp/wchc” are CPU intensive and could cause
spike of CPU utilization on ZooKeeper server if abused,
which leads to the server unable to serve legitimate client requests. There is
no known compromise which takes advantage of this vulnerability.
Mitigation:
This affects ZooKeeper ensembles whose client port is publicly accessible, so
it is recommended to protect ZooKeeper ensemble with firewall.
Documentation has also been updated to clarify on this point. In addition, a
patch (ZOOKEEPER-2693) is provided to disable "wchp/wchc” commands
by default.
- ZooKeeper 3.4.x users should upgrade to 3.4.10 when released or apply the
patch.
- ZooKeeper 3.5.x users should upgrade to 3.5.3 when released or apply the
patch.
{noformat}
> Create CVE text for ZOOKEEPER-2693 "DOS attack on wchp/wchc four letter words
> (4lw)"
> ------------------------------------------------------------------------------------
>
> Key: ZOOKEEPER-2713
> URL: https://issues.apache.org/jira/browse/ZOOKEEPER-2713
> Project: ZooKeeper
> Issue Type: Task
> Components: security
> Reporter: Patrick Hunt
> Priority: Blocker
> Fix For: 3.4.10, 3.5.3
>
>
> We need to agree to the CVE text for ZOOKEEPER-2693. Let's use the comments
> here to do so.
> The assigned CVE number is CVE-2017-5637
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)