CVE-2017-5637: Uncontrolled Resource Consumption in Apache ZooKeeper
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.95187%
CWE
Published
5/13/2022
Updated
1/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.zookeeper:zookeeper | maven | >= 3.4.0, <= 3.4.9 | 3.4.10 |
org.apache.zookeeper:zookeeper | maven | >= 3.5.0, <= 3.5.2 | 3.5.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from race conditions in whitelist management. The patch adds synchronization to critical section methods (isEnabled
and resetWhiteList
) that control command authorization. The original non-synchronized implementations allowed concurrent access to incomplete whitelist states, permitting execution of resource-intensive commands like wchp/wchc
even when disabled. These functions would appear in profilers during command processing and authorization checks when the vulnerability is exploited.