ID CVE-2012-1574
Summary The Kerberos/MapReduce security functionality in Apache Hadoop 0.20.203.0 through 0.20.205.0, 0.23.x before 0.23.2, and 1.0.x before 1.0.2, as used in Cloudera CDH CDH3u0 through CDH3u2, Cloudera hadoop-0.20-sbin before 0.20.2+923.197, and other products, allows remote authenticated users to impersonate arbitrary cluster user accounts via unspecified vectors.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:hadoop:0.20.203.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:hadoop:0.20.203.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:hadoop:0.20.204.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:hadoop:0.20.204.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:hadoop:0.20.205.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:hadoop:0.20.205.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:hadoop:0.23.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:hadoop:0.23.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:hadoop:0.23.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:hadoop:0.23.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:hadoop:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:hadoop:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:hadoop:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:hadoop:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cloudera:cloudera_cdh:cdh3:0:*:*:*:*:*:*
    cpe:2.3:a:cloudera:cloudera_cdh:cdh3:0:*:*:*:*:*:*
  • cpe:2.3:a:cloudera:cloudera_cdh:cdh3:1:*:*:*:*:*:*
    cpe:2.3:a:cloudera:cloudera_cdh:cdh3:1:*:*:*:*:*:*
  • cpe:2.3:a:cloudera:cloudera_cdh:cdh3:2:*:*:*:*:*:*
    cpe:2.3:a:cloudera:cloudera_cdh:cdh3:2:*:*:*:*:*:*
  • cpe:2.3:a:cloudera:hadoop:0.20-sbin:*:*:*:*:*:*:*
    cpe:2.3:a:cloudera:hadoop:0.20-sbin:*:*:*:*:*:*:*
  • cpe:2.3:a:cloudera:hadoop:0.20.1\+169:*:*:*:*:*:*:*
    cpe:2.3:a:cloudera:hadoop:0.20.1\+169:*:*:*:*:*:*:*
  • cpe:2.3:a:cloudera:hadoop:0.20.2\+923:*:*:*:*:*:*:*
    cpe:2.3:a:cloudera:hadoop:0.20.2\+923:*:*:*:*:*:*:*
CVSS
Base: 6.5 (as of 24-03-2017 - 01:59)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:P/A:P
refmap via4
bid 52939
bugtraq 20120405 [CVE-2012-1574] Apache Hadoop user impersonation vulnerability
confirm
fulldisc 20120405 [CVE-2012-1574] Apache Hadoop user impersonation vulnerability
secunia
  • 48775
  • 48776
Last major update 24-03-2017 - 01:59
Published 12-04-2012 - 10:45
Last modified 24-03-2017 - 01:59
Back to Top