First published: Mon Mar 05 2018(Updated: )
Apache Thrift Java client library versions 0.5.0 prior to 0.9.3-1 and 0.10.0 prior to 0.12.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/thrift | <0.12.0 | 0.12.0 |
maven/org.apache.thrift:libthrift | >=0.10.0<0.12.0 | 0.12.0 |
maven/org.apache.thrift:libthrift | >=0.5.0<0.9.3-1 | 0.9.3-1 |
Apache Thrift | >=0.5.0<=0.11.0 | |
Debian Debian Linux | =8.0 | |
F5 Traffix Signaling Delivery Controller | >=5.0.0<=5.1.0 | |
Oracle Global Lifecycle Management Opatch | <11.2.0.3.23 | |
Oracle Global Lifecycle Management Opatch | >=12.2.0.1.0<12.2.0.1.19 | |
Oracle Global Lifecycle Management Opatch | >=13.9.4.0.0<13.9.4.2.1 | |
Oracle Nosql Database | <19.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1320 is a vulnerability in the Apache Thrift Java client library.
CVE-2018-1320 has a severity rating of high.
Apache Thrift Java client library versions 0.5.0 through 0.11.0, as well as versions 0.9.3-1 and 0.10.0, are affected by CVE-2018-1320.
CVE-2018-1320 can be exploited by bypassing SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class.
Yes, the fix for CVE-2018-1320 is available in Apache Thrift Java client library version 0.12.0.