ID CVE-2012-4449 Type cve Reporter cve@mitre.org Modified 2017-11-21T15:53:00
Description
Apache Hadoop before 0.23.4, 1.x before 1.0.4, and 2.x before 2.0.2 generate token passwords using a 20-bit secret when Kerberos security features are enabled, which makes it easier for context-dependent attackers to crack secret keys via a brute-force attack.
{"openvas": [{"lastseen": "2019-05-29T18:34:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-4449"], "description": "The host is installed with Apache Hadoop\n and is prone to a weak key encryption vulnerability.", "modified": "2018-10-19T00:00:00", "published": "2017-11-08T00:00:00", "id": "OPENVAS:1361412562310811969", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811969", "type": "openvas", "title": "Apache Hadoop Weak Key Encryption Vulnerability", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_apache_hadoop_key_weak_encryption_vuln.nasl 11983 2018-10-19 10:04:45Z mmartin $\n#\n# Apache Hadoop Weak Key Encryption Vulnerability\n#\n# Authors:\n# Kashinath T <tkashinath@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:apache:hadoop\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811969\");\n script_version(\"$Revision: 11983 $\");\n script_cve_id(\"CVE-2012-4449\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-19 12:04:45 +0200 (Fri, 19 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-11-08 11:34:54 +0530 (Wed, 08 Nov 2017)\");\n script_name(\"Apache Hadoop Weak Key Encryption Vulnerability\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Apache Hadoop\n and is prone to a weak key encryption vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to an error in an unknown\n function of the component 'Kerberos Security Feature'.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow a remote\n attacker to crack secret keys via a brute-force attack.\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n script_tag(name:\"affected\", value:\"Apache Hadoop before 0.23.4, 1.x before 1.0.4,\n and 2.x before 2.0.2\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Apache Hadoop version 0.23.4 or\n 1.0.4 or 2.0.2 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://vuldb.com/de/?id.108783\");\n script_xref(name:\"URL\", value:\"https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html#topic_1_0\");\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Web application abuses\");\n script_dependencies(\"gb_apache_hadoop_detect.nasl\");\n script_mandatory_keys(\"Apache/Hadoop/Installed\");\n script_require_ports(\"Services/www\", 50070);\n script_xref(name:\"URL\", value:\"http://www.hadoop.apache.org\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!hadoopPort = get_app_port(cpe:CPE)){\n exit(0);\n}\n\nif(!infos = get_app_version_and_location(cpe:CPE, port:hadoopPort, exit_no_version:TRUE)) exit(0);\nhadoopVer = infos['version'];\nhadoopPath = infos['location'];\n\nif(hadoopVer =~ \"^(2\\.0)\" && version_is_less(version:hadoopVer, test_version:\"2.0.2\")){\n fix = \"2.0.2\";\n}\n\nelse if(version_in_range(version:hadoopVer, test_version:\"1.0\", test_version2:\"1.0.3\")){\n fix = \"1.0.4\";\n}\n\nelse if(version_is_less(version:hadoopVer, test_version:\"0.23.4\")){\n fix = \"0.23.4\";\n}\n\nif(fix)\n{\n report = report_fixed_ver(installed_version:hadoopVer, fixed_version:fix, install_path:hadoopPath);\n security_message(data:report, port:hadoopPort);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}