Vulnerability Details : CVE-2017-3166
In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, and 3.0.0-alpha1, if a file in an encryption zone with access permissions that make it world readable is localized via YARN's localization mechanism, that file will be stored in a world-readable location and can be shared freely with any application that requests to localize that file.
Products affected by CVE-2017-3166
- cpe:2.3:a:apache:hadoop:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hadoop:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hadoop:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hadoop:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hadoop:2.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hadoop:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hadoop:2.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hadoop:3.0.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:apache:hadoop:2.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hadoop:2.6.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-3166
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-3166
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2017-3166
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-3166
-
https://lists.apache.org/thread.html/2e16689b44bdd1976b6368c143a4017fc7159d1f2d02a5d54fe9310f@%3Cgeneral.hadoop.apache.org%3E
[SECURITY] CVE-2017-3166: Apache Hadoop Privilege escalation vulnerability - Pony MailIssue Tracking;Mailing List;Vendor Advisory
-
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
[GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities - Pony Mail
Jump to