Buffer Overflow Vulnerability in Apache Ranger by Apache
CVE-2018-11778
8.8HIGH
Summary
Apache Ranger prior to version 1.2.0 is susceptible to a stack-based buffer overflow due to improper user input handling in the UnixAuthenticationService. Exploiting this vulnerability could lead to application crashes or allow arbitrary code execution. To mitigate risks, users are advised to upgrade to version 1.2.0 or later, which includes necessary fixes to ensure system integrity and secure operations.
Affected Version(s)
Apache Ranger prior to 1.2.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved