Description
Apache Hadoop before 0.23.4, 1.x before 1.0.4, and 2.x before 2.0.2 generate token passwords using a 20-bit secret when Kerberos security features are enabled, which makes it easier for context-dependent attackers to crack secret keys via a brute-force attack.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4876 | Apache Hadoop before 0.23.4, 1.x before 1.0.4, and 2.x before 2.0.2 generate token passwords using a 20-bit secret when Kerberos security features are enabled, which makes it easier for context-dependent attackers to crack secret keys via a brute-force attack. |
Github GHSA |
GHSA-q46v-cj5v-hvg6 | Use of a Broken or Risky Cryptographic Algorithm in Apache Hadoop |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T20:35:09.926Z
Reserved: 2012-08-21T00:00:00.000Z
Link: CVE-2012-4449
No data.
Status : Modified
Published: 2017-10-30T19:29:00.200
Modified: 2026-05-13T00:24:29.033
Link: CVE-2012-4449
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA