UBUNTU-CVE-2018-1320

Source
https://ubuntu.com/security/CVE-2018-1320
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1320.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2018-1320
Related
Published
2019-01-07T17:29:00Z
Modified
2025-01-13T10:21:32Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.

References

Affected packages

Ubuntu:16.04:LTS / libthrift-java

Package

Name
libthrift-java
Purl
pkg:deb/ubuntu/libthrift-java@0.9.1-2.1~build0.16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.1-2.1~build0.16.04.1

Affected versions

0.*

0.9.1-2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "0.9.1-2.1~build0.16.04.1",
            "binary_name": "libthrift-java"
        }
    ]
}

Ubuntu:18.04:LTS / libthrift-java

Package

Name
libthrift-java
Purl
pkg:deb/ubuntu/libthrift-java@0.9.1-2.1~build0.18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.1-2.1~build0.18.04.1

Affected versions

0.*

0.9.1-2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "0.9.1-2.1~build0.18.04.1",
            "binary_name": "libthrift-java"
        }
    ]
}