Authentication Bypass Vulnerability in Apache Impala by Malicious Daemon
CVE-2017-5640
9.8CRITICAL
Summary
A vulnerability in Apache Impala allows a malicious process impersonating an Impala daemon to bypass authentication checks when Kerberos is enabled without TLS. If the malicious server prematurely responds with 'COMPLETE' during the SASL handshake, the client perceives the handshake as successful, leaving it vulnerable to unauthorized access and exposing sensitive data.
Affected Version(s)
Apache Impala 2.7.0 to 2.8.0 incubating
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved