[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] [SECURITY] CVE-2017-9797 Apache Geode client/server authentication vulnerability
From:       Anthony Baker <abaker () apache ! org>
Date:       2017-09-29 17:35:55
Message-ID: CAEwge-Hrbb7JS8Nygrh7geyFvW4bMZ3AdCmPOzMfvbniipz0bA () mail ! gmail ! com
[Download RAW message or body]

CVE-2017-9797 Apache Geode client/server authentication vulnerability

Severity: Medium
CVSS Base Score 6.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H)

Vendor: The Apache Software Foundation

Versions Affected:
Apache Geode 1.0.0 through 1.2.0

Description:
When a cluster is operating in secure mode, an unauthenticated client
can enter multi-user authentication mode and send metadata messages.
These metadata operations could leak information about application
data types.  In addition, an attacker could perform a denial of
service attack on the cluster.

Mitigation:
Users of the affected versions should upgrade to Apache Geode 1.2.1 or later.

Credit:
This issue was reported responsibly to the Apache Geode Security Team
by Dan Smith from Pivotal.

References:
[1] https://issues.apache.org/jira/browse/GEODE-3249
[2] https://cwiki.apache.org/confluence/display/GEODE/Release+Notes#ReleaseNotes-SecurityVulnerabilities

---
The Geode PMC
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic