First published: Thu Mar 23 2017(Updated: )
Cloudera Navigator 2.2.x before 2.2.4 and 2.3.x before 2.3.3 include support for SSLv3 when configured to use SSL/TLS, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudera Manager | =5.3.0 | |
Cloudera Manager | =5.3.1 | |
Cloudera Manager | =5.3.2 | |
Cloudera Manager | =5.3.3 | |
Cloudera Manager | =5.4.0 | |
Cloudera Manager | =5.4.1 | |
Cloudera Navigator | =2.2.0 | |
Cloudera Navigator | =2.2.1 | |
Cloudera Navigator | =2.2.2 | |
Cloudera Navigator | =2.2.3 | |
Cloudera Navigator | =2.3.0 | |
Cloudera Navigator | =2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4078 is classified as a medium severity vulnerability.
To mitigate CVE-2015-4078, upgrade Cloudera Navigator to version 2.2.4 or 2.3.3 or later.
CVE-2015-4078 can be exploited by man-in-the-middle attackers via a padding-oracle attack.
CVE-2015-4078 affects Cloudera Navigator versions 2.2.0 to 2.2.3 and 2.3.0 to 2.3.1.
CVE-2015-4078 is caused by the support for SSLv3 in Cloudera Navigator, which is vulnerable to the POODLE attack.