Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-38153

Опубликовано: 21 сент. 2021
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

Some components in Apache Kafka use Arrays.equals to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel8Not affected
Red Hat build of Quarkuskafka-clientsAffected
Red Hat CodeReady Studio 12kafka-clientsWill not fix
Red Hat Decision Manager 7kafka-clientsAffected
Red Hat Integration Service Registrykafka-clientsAffected
Red Hat JBoss Enterprise Application Platform Expansion Packkafka-clientsOut of support scope
Red Hat JBoss Fuse 6kafka-clientsOut of support scope
Red Hat OpenShift Container Platform 4openshift4/ose-logging-elasticsearch6Not affected
Red Hat OpenShift Container Platform 4openshift4/ose-metering-hadoopNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-metering-hiveNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-367
https://bugzilla.redhat.com/show_bug.cgi?id=2009041Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients

EPSS

Процентиль: 80%
0.01432
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 4 лет назад

Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.

CVSS3: 5.9
nvd
больше 4 лет назад

Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.

CVSS3: 5.9
debian
больше 4 лет назад

Some components in Apache Kafka use `Arrays.equals` to validate a pass ...

CVSS3: 5.9
github
больше 4 лет назад

Observable Discrepancy in Apache Kafka

CVSS3: 5.9
fstec
больше 4 лет назад

Уязвимость диспетчера сообщений Apache Kafka, позволяющая нарушителю реализовать атаку методом «грубой силы» (brute force)

EPSS

Процентиль: 80%
0.01432
Низкий

5.9 Medium

CVSS3