Introducing the all-new TIBCO Community site!

For current users, please click "Sign In" to reset your password and access the enhanced features. If you're a first-time visitor, we extend a warm welcome—click "Sign Up" to become a part of the TIBCO Community!

If you're seeking alternative community sites, explore ibi, Jaspersoft, and Spotfire.

Jump to content
  • TIBCO Security Advisory: June 11, 2019 - ApacheKafka


    admin

    Apache Kafka Vulnerable To Persistent Remote Denial Of Service Via Topic Names

    Original release date: June 11,2019
    Last revised:
    Source: TIBCO Software Inc.

    Apache Kafka Vulnerable To Persistent Remote Denial Of Service Via Topic Names

    Original release date: June 11, 2019
    Last revised: ---
    Source: TIBCO Software Inc.


    Systems Affected

    Apache Kafka versions 2.2.0 and below.

    TIBCO Messaging - Apache Kafka Distribution - Core - Community Edition
    versions 2.1.0 and below

    TIBCO Messaging - Apache Kafka Distribution - Core - Enterprise Edition
    versions 2.1.0 and below

    The following component is affected:

    * Topic management


    Description

    The component listed above contains a vulnerability that theoretically allows
    a user with permission to create topics which will trigger an unexpected
    server process exit. With the specially crafted topic names, when the server
    deletes at user request, discards according to retention policy, or
    repartitions, it is theoretically possible that the server will terminate
    unexpectedly.


    Impact

    The impact of this vulnerability includes the theoretical possibility that
    a malicious user could unexpectedly terminate a cluster of Kafka server
    processes. The possibility exists that attempts to restart the server will
    also fail.

    CVSS v3 Base Score: 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


    Solution

    TIBCO has released updated versions of the affected components which
    address these issues.

    TIBCO Messaging - Apache Kafka Distribution - Core - Community Edition
    versions 2.1.0 and below upgrade to version 2.2.0-1

    TIBCO Messaging - Apache Kafka Distribution - Core - Enterprise Edition
    versions 2.1.0 and below upgrade to version 2.2.0-1


    Acknowledgments

    TIBCO would like to extend its appreciation to Dave Yesland of Rhino Security
    Labs for discovery of this vulnerability.


    References

    http://www.tibco.com/services/support/advisories
    https://issues.apache.org/jira/browse/KAFKA-4893

    The information on this page is being provided to you on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page mayor may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUTNOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of yourlicense and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms ofUse, and may be used only for the purposes contemplated by such Terms ofUse.



×
×
  • Create New...