5 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in the protobuf crate before 2.6.0 for Rust. Attackers can exhaust all memory via Vec::reserve calls. Se descubrió un problema en el paquete protobuf antes de 2.6.0 para Rust. Los atacantes pueden agotar toda la memoria a través de llamadas Vec :: reserve. • https://lists.apache.org/thread.html/r00097d0b5b6164ea428554007121d5dc1f88ba2af7b9e977a10572cd%40%3Cdev.hbase.apache.org%3E https://lists.apache.org/thread.html/r4ef574a5621b0e670a3ce641e9922543e34f22bf4c9ee9584aa67fcf%40%3Cissues.hbase.apache.org%3E https://lists.apache.org/thread.html/r7fed8dd9bee494094e7011cf3c2ab75bd8754ea314c6734688c42932%40%3Ccommon-issues.hadoop.apache.org%3E https://lists.apache.org/thread.html/rd64381fb8f92d640c1975dc50dcdf1b8512e02a2a7b20292d3565cae%40%3Cissues.hbase.apache.org%3E https://rustsec.org/advisories/RUSTSEC-2019-0003.html • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

In all previously released Apache HBase 2.x versions (2.0.0-2.0.4, 2.1.0-2.1.3), authorization was incorrectly applied to users of the HBase REST server. Requests sent to the HBase REST server were executed with the permissions of the REST server itself, not with the permissions of the end-user. This issue is only relevant when HBase is configured with Kerberos authentication, HBase authorization is enabled, and the REST server is configured with SPNEGO authentication. This issue does not extend beyond the HBase REST server. En todas las versiones anteriormente publicadas de Apache HBase 2.x (2.0.0-2.0.4, 2.1.0-2.1.3), se aplicaba una autorización de manera incorrecta a los usuarios del servidor REST "HBase". • http://www.openwall.com/lists/oss-security/2019/03/27/3 http://www.securityfocus.com/bid/107624 https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E https://lists.apache.org/thread.html/66535e15007cda8f9308eec10e12ffe349e0b8b55e56ec6ee02b71d2%40%3Cdev.hbase.apache.org%3E https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 0

CVE-2018-8025 describes an issue in Apache HBase that affects the optional "Thrift 1" API server when running over HTTP. There is a race-condition which could lead to authenticated sessions being incorrectly applied to users, e.g. one authenticated user would be considered a different user or an unauthenticated user would be treated as an authenticated user. https://issues.apache.org/jira/browse/HBASE-20664 implements a fix for this issue. It has been fixed in versions: 1.2.6.1, 1.3.2.1, 1.4.5, 2.0.1. CVE-2018-8025 describe un problema en Apache HBase que afecta al servidor opcional de la API "Thrift 1" cuando se ejecuta por HTTP. Hay una condición de carrera que puede conducir a que se aplican sesiones autenticadas incorrectamente a los usuarios, por ejemplo, un usuario autenticado se consideraría un usuario diferente o un usuario no autenticado se trataría como usuario autenticado. https://issues.apache.org/jira/browse/HBASE-20664 implementa una solución para este problema. • http://www.securityfocus.com/bid/104554 https://lists.apache.org/thread.html/a919e38f587c714c386a01d40fc8f45bd4219a65aaf2dc0bb4eccc96%40%3Cdev.hbase.apache.org%3E • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 0

Apache HBase 0.98 before 0.98.12.1, 1.0 before 1.0.1.1, and 1.1 before 1.1.0.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, uses incorrect ACLs for ZooKeeper coordination state, which allows remote attackers to cause a denial of service (daemon outage), obtain sensitive information, or modify data via unspecified client traffic. Apache HBase 0.98 en versiones anteriores a 0.98.12.1, 1.0 en versiones anteriores a 1.0.1.1 y 1.1 en versiones anteriores a 1.1.0.1, como se utiliza en IBM InfoSphere BigInsights 3.0, 3.0.0.1 y 3.0.0.2 y en otros productos, utiliza de forma incorrecta ACLs para el estado de coordinación de ZooKeeper, lo que permite a atacantes remotos provocar una denegación de servicio (interrupción del demonio), obtener información sensible o modificar datos a través de tráfico de cliente no especificado. • http://mail-archives.apache.org/mod_mbox/www-announce/201505.mbox/%3CCA+RK=_CFiTfQ2d0V+kuJx_y5izmYccaKjXaJ3V72KK7tbOhbkg%40mail.gmail.com%3E http://www-01.ibm.com/support/docview.wss?uid=swg21969546 http://www.securitytracker.com/id/1034365 https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html • CWE-284: Improper Access Control •

CVSS: 4.3EPSS: 0%CPEs: 13EXPL: 0

Apache HBase 0.92.x before 0.92.3 and 0.94.x before 0.94.9, when the Kerberos features are enabled, allows man-in-the-middle attackers to disable bidirectional authentication and obtain sensitive information via unspecified vectors. Apache HBase 0.92.x anterior a 0.92.3 y 0.94.x anterior a 0.94.9, cuando las funcionalidades Kerberos están habilitadas, permite a atacantes man-in-the-middle deshabilitar autenticación bidireccional y obtener información sensible a través de vectores no especificados. • http://osvdb.org/96615 http://seclists.org/fulldisclosure/2013/Aug/250 https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html • CWE-287: Improper Authentication •