You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
CVE-2017-5637 - High Severity Vulnerability
Path to dependency file: simplepom/pom.xml
Path to vulnerable library: /repository/org/apache/zookeeper/zookeeper/3.4.3/zookeeper-3.4.3.jar
Dependency Hierarchy:
Found in HEAD commit: 5eb05d51082d8163db463c87084540d92525daed
Found in base branch: main
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
Publish Date: 2017-10-10
URL: CVE-2017-5637
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637
Release Date: 2017-10-10
Fix Resolution: 3.4.10,3.5.3
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: