First published: Fri Sep 29 2017(Updated: )
When an Apache Geode cluster before v1.2.1 is operating in secure mode, an unauthenticated client can enter multi-user authentication mode and send metadata messages. These metadata operations could leak information about application data types. In addition, an attacker could perform a denial of service attack on the cluster.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Geode | <=1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-9797 is considered high due to potential information leakage and denial of service risks.
To fix CVE-2017-9797, upgrade to Apache Geode version 1.2.1 or later as it includes a patch for this vulnerability.
CVE-2017-9797 affects users of Apache Geode versions prior to 1.2.1 that are operating in secure mode.
CVE-2017-9797 can allow unauthenticated clients to leak metadata information and potentially perform denial of service attacks.
Yes, CVE-2017-9797 can be exploited remotely since it allows unauthenticated clients to access metadata messages.