CVE-2017-5637
Published: 10 October 2017
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
From the Ubuntu Security Team
It was discovered that Apache ZooKeeper incorrectly implemented "wchp/wchc" commands. An attacker could possibly use this issue to cause a denial of service.
Priority
Status
Package | Release | Status |
---|---|---|
zookeeper Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Not vulnerable
(3.4.10-3)
|
|
cosmic |
Not vulnerable
(3.4.10-3)
|
|
disco |
Not vulnerable
(3.4.10-3)
|
|
eoan |
Not vulnerable
(3.4.10-3)
|
|
focal |
Not vulnerable
(3.4.10-3)
|
|
groovy |
Not vulnerable
(3.4.10-3)
|
|
hirsute |
Not vulnerable
(3.4.10-3)
|
|
impish |
Not vulnerable
(3.4.10-3)
|
|
jammy |
Not vulnerable
(3.4.10-3)
|
|
trusty |
Released
(3.4.5+dfsg-1ubuntu0.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Released
(3.4.5+dfsg-2+deb8u2, 3.4.9-3)
|
|
xenial |
Released
(3.4.8-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |