Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2017-5637
Severity
7.5HIGH
EPSS
17.4%
top 4.93%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedOct 10
Latest updateMay 13
Description
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages5 packages
Also affects: Debian Linux 8.0
🔴Vulnerability Details
5OSV▶
CVE-2017-5637: Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads↗2017-10-10
CVEList▶
CVE-2017-5637: Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads↗2017-10-10
💥Exploits & PoCs
1📋Vendor Advisories
4Debian▶
CVE-2017-5637: zookeeper - Two four letter word commands "wchp/wchc" are CPU intensive and could cause spik...↗2017