Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-5637


Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.


Published

2017-10-10T01:30:22.360

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-306
    CWE-400

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache zookeeper 3.4.0 Yes
Application apache zookeeper 3.4.1 Yes
Application apache zookeeper 3.4.2 Yes
Application apache zookeeper 3.4.3 Yes
Application apache zookeeper 3.4.4 Yes
Application apache zookeeper 3.4.5 Yes
Application apache zookeeper 3.4.6 Yes
Application apache zookeeper 3.4.7 Yes
Application apache zookeeper 3.4.8 Yes
Application apache zookeeper 3.4.9 Yes
Application apache zookeeper 3.5.0 Yes
Application apache zookeeper 3.5.1 Yes
Application apache zookeeper 3.5.2 Yes
Operating System debian debian_linux 8.0 Yes

References