CVE-2018-1320

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-1320
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1320.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-1320
Aliases
Related
Published
2019-01-07T17:29:00Z
Modified
2024-09-18T01:00:20Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.

References

Affected packages

Debian:12 / libthrift-java

Package

Name
libthrift-java
Purl
pkg:deb/debian/libthrift-java?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.1-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libthrift-java

Package

Name
libthrift-java
Purl
pkg:deb/debian/libthrift-java?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.1-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}