Apache Software Foundation Thrift 0.9.3

CPE Details

Apache Software Foundation Thrift 0.9.3
0.9.3
2019-06-18
13h34 +00:00
2019-06-18
13h34 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:apache:thrift:0.9.3:*:*:*:*:*:*:*

Informations

Vendor

apache

Product

thrift

Version

0.9.3

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-13949 2021-02-12 18h39 +00:00 In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service.
7.5
Haute
CVE-2019-0205 2019-10-28 21h32 +00:00 In Apache Thrift all versions up to and including 0.12.0, a server or client may run into an endless loop when feed with specific input data. Because the issue had already been partially fixed in version 0.11.0, depending on the installed version it affects only certain language bindings.
7.5
Haute
CVE-2019-0210 2019-10-28 21h22 +00:00 In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid input data.
7.5
Haute
CVE-2018-1320 2019-01-07 17h00 +00:00 Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.
7.5
Haute
CVE-2016-5397 2018-02-12 17h00 +00:00 The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0.
8.8
Haute