zookeeper is vulnerable to denial of service (DoS) attacks. The vulnerability is possible because it does not properly handle four letter zookeeper commands (such as wchp
/wchc
/wchc
). Therefore, when non-trusted clients get access to the client port (i.e., if the zookeeper service is not protected using firewall), an attacker can launch DoS attack.
www.debian.org/security/2017/dsa-3871
www.securityfocus.com/bid/98814
access.redhat.com/errata/RHSA-2017:2477
access.redhat.com/errata/RHSA-2017:3354
access.redhat.com/errata/RHSA-2017:3355
github.com/apache/zookeeper/pull/179/
github.com/apache/zookeeper/pull/183
issues.apache.org/jira/browse/ZOOKEEPER-2693
issues.apache.org/jira/browse/ZOOKEEPER-2699
issues.apache.org/jira/browse/ZOOKEEPER-2713
lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370@%3Cdev.zookeeper.apache.org%3E
lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E
lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E
patch-diff.githubusercontent.com/raw/apache/zookeeper/pull/179.patch
webcache.googleusercontent.com/search?q=cache:_CNGIz10PRYJ:https://www.exploit-db.com/exploits/41277/+&cd=14&hl=en&ct=clnk&gl=us
www.oracle.com/security-alerts/cpujul2020.html