[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Apache Impala 2.8.0 Authentication Bypass Vulnerability

Author
Cloudera
Risk
[
Security Risk High
]
0day-ID
0day-ID-28113
Category
remote exploits
Date add
11-07-2017
CVE
CVE-2017-5640
Platform
multiple
CVE-2017-5640 Apache Impala (incubating) Information Disclosure

Versions Affected:
Apache Impala (incubating) 2.7.0 to 2.8.0

Description:
It was noticed that a malicious process impersonating an Impala daemon
could cause Impala daemons to skip authentication checks when Kerberos
is enabled (but TLS is not). If the malicious server responds with
aCOMPLETEa before the SASL handshake has completed, the client will
consider the handshake as completed even though no exchange of
credentials has happened.

Mitigation:
Users of the affected versions should apply the following mitigation:
Upgrade to Apache Impala (incubating) 2.9.0

Credit:
This issue was identified by the Cloudera Security team.

References:
https://issues.apache.org/jira/browse/IMPALA-5005

#  0day.today [2024-11-15]  #