CVE-2015-3254
CVSS4.0
发布时间 :2017-06-16 18:29:00
修订时间 :2017-06-20 21:29:00
NMS    

[原文]The client libraries in Apache Thrift before 0.9.3 might allow remote authenticated users to cause a denial of service (infinite recursion) via vectors involving the skip function.


[CNNVD]CNNVD数据暂缺。


[机译]Google 翻译(企业版):

- CVSS (基础分值)

CVSS分值: 4 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: SINGLE_INSTANCE [--]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3254
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3254
(官方数据源) NVD

- 其它链接及资源

http://grokbase.com/t/thrift/user/15c2tss3td/notice-apache-thrift-security-vulnerability-cve-2015-1774
(VENDOR_ADVISORY)  CONFIRM  http://grokbase.com/t/thrift/user/15c2tss3td/notice-apache-thrift-security-vulnerability-cve-2015-1774
http://www.securityfocus.com/bid/99112
(UNKNOWN)  BID  99112
https://issues.apache.org/jira/browse/THRIFT-3231
(VENDOR_ADVISORY)  CONFIRM  https://issues.apache.org/jira/browse/THRIFT-3231
https://mail-archives.apache.org/mod_mbox/thrift-user/201512.mbox/%3CCANyrgvcjvEcjTVmaL+tVXCBm4o5G+1neu=MUubD9GbU85bO_Ew@mail.gmail.com%3E
(VENDOR_ADVISORY)  MLIST  [thrift-user] 20151210 Re: [NOTICE]: Apache Thrift Security Vulnerability CVE-2015-1774

- 漏洞信息

Apache Thrift CVE-2015-3254 Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 99112
Yes No
2017-06-16 12:00:00 2017-06-16 12:00:00
Jake Farrell

- 受影响的程序版本

Apache Thrift 0.9.2
Apache Thrift 0.9.1
Apache Thrift 0.9
,Apache Thrift 0.9.3

- 不受影响的程序版本

Apache Thrift 0.9.3

- 漏洞讨论

Apache Thrift is prone to a denial-of-service vulnerability.

Attackers may leverage this issue to cause infinite recursion, denying service to legitimate users.

Versions prior to Apache Thrift 0.9.3 are vulnerable.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站