CVE-2017-5652

During a routine security analysis, it was found that one of the ports in Apache Impala (incubating) 2.7.0 to 2.8.0 sent data in plaintext even when the cluster was configured to use TLS. The port in question was used by the StatestoreSubscriber class which did not use the appropriate secure Thrift transport when TLS was turned on. It was therefore possible for an adversary, with access to the network, to eavesdrop on the packets going to and coming from that port and view the data in plaintext.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:impala:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:impala:2.8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://www.securityfocus.com/archive/1/540831/100/0/threaded - () http://www.securityfocus.com/archive/1/540831/100/0/threaded -
References () https://lists.apache.org/thread.html/5bab4424f23aebefc8108a0e30273c2a543a289df8113c461f930143%40%3Cdev.impala.apache.org%3E - () https://lists.apache.org/thread.html/5bab4424f23aebefc8108a0e30273c2a543a289df8113c461f930143%40%3Cdev.impala.apache.org%3E -

Information

Published : 2017-07-10 20:29

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5652

Mitre link : CVE-2017-5652

CVE.ORG link : CVE-2017-5652


JSON object : View

Products Affected

apache

  • impala
CWE
CWE-319

Cleartext Transmission of Sensitive Information