5
CVSSv2

CVE-2017-5637

Published: 10/10/2017 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache zookeeper 3.5.0

apache zookeeper 3.5.2

apache zookeeper 3.5.1

apache zookeeper 3.4.9

apache zookeeper 3.4.8

apache zookeeper 3.4.7

apache zookeeper 3.4.6

apache zookeeper 3.4.5

apache zookeeper 3.4.4

apache zookeeper 3.4.3

apache zookeeper 3.4.2

apache zookeeper 3.4.1

apache zookeeper 3.4.0

debian debian linux 8.0

Vendor Advisories

Synopsis Moderate: Red Hat JBoss BPM Suite 647 security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat JBoss BPM SuiteRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base sc ...
Synopsis Moderate: Red Hat JBoss BRMS 647 security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat JBoss BRMSRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, which ...
It was discovered that Zookeeper, a service for maintaining configuration information, didn't restrict access to the computationally expensive wchp/wchc commands which could result in denial of service by elevated CPU consumption This update disables those two commands by default The new configuration option 4lwcommandswhitelist can be used to ...
Debian Bug report logs - #899332 CVE-2018-8012: Apache ZooKeeper Quorum Peer mutual authentication Package: zookeeper; Maintainer for zookeeper is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Source for zookeeper is src:zookeeper (PTS, buildd, popcon) Reported by: Markus Koschany <apo@debianorg ...
Debian Bug report logs - #863811 CVE-2017-5637 Package: src:zookeeper; Maintainer for src:zookeeper is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 31 May 2017 12:48:02 UTC Severity: grave Tags: fixed-upstream, security, upstream ...
Debian Bug report logs - #929283 zookeeper: CVE-2019-0201: information disclosure vulnerability Package: src:zookeeper; Maintainer for src:zookeeper is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 20 May 2019 20:06:01 UTC Seve ...
A denial of service vulnerability was discovered in ZooKeeper which allows an attacker to dramatically increase CPU utilization by abusing "wchp/wchc" commands, leading to the server being unable to serve legitimate requests ...

Exploits

#!/usr/bin/python # Exploit Title: Zookeeper Client Denial Of Service (Port 2181) # Date: 2/7/2017 # Exploit Author: Brandon Dennis # Email: bdennis@mailhodgesedu # Software Link: zookeeperapacheorg/releaseshtml#download # Zookeeper Version: 352 # Tested on: Windows 2008 R2, Windows 2012 R2 x64 & x86 # Description: The wchp comma ...