VYPR
High severity7.5NVD Advisory· Published Oct 10, 2017· Updated May 13, 2026

CVE-2017-5637

CVE-2017-5637

Description

Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.zookeeper:zookeeperMaven
>= 3.4.0, < 3.4.103.4.10
org.apache.zookeeper:zookeeperMaven
>= 3.5.0, < 3.5.33.5.3

Affected products

15
  • Apache/Zookeeper13 versions
    cpe:2.3:a:apache:zookeeper:3.4.0:*:*:*:*:*:*:*+ 12 more
    • cpe:2.3:a:apache:zookeeper:3.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.4.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.4.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.4.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:zookeeper:3.5.2:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • Apache Software Foundation/Apache ZooKeeperv5
    Range: 3.4.0 to 3.4.9

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

18

News mentions

0

No linked articles in our index yet.