<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Vulnerability assessment test in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Vulnerability-assessment-test/m-p/39449#M23892</link>
    <description>&lt;P&gt;Thanks&amp;nbsp;&lt;SPAN class=""&gt;&lt;A href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/10253" target="_blank"&gt;cjervis&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;I fixed that vulnerability issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Yes what you said is correct "dotproject" is not related to cloudera. but whene ever we tested the assessment that time we faced like dot project.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;So, I gave the&amp;nbsp;privileges for 25000 port which impala port. Throught this port only&amp;nbsp;&lt;SPAN&gt;v&lt;/SPAN&gt;&lt;SPAN&gt;ulnerability raised because of&amp;nbsp;&lt;STRONG&gt;Privilege Escalation vulnerability. &lt;/STRONG&gt;Finally it's fixed.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Thanks for your responce&amp;nbsp;&lt;A href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/10253" target="_blank"&gt;cjervis&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 07 Apr 2016 12:32:45 GMT</pubDate>
    <dc:creator>steh</dc:creator>
    <dc:date>2016-04-07T12:32:45Z</dc:date>
    <item>
      <title>Vulnerability assessment test</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Vulnerability-assessment-test/m-p/39124#M23889</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We ran&amp;nbsp;Vulnerability assessment test and we could see some &lt;SPAN&gt;Vulnerabilities in cloudera. Have mentioned the description of the reported&amp;nbsp;Vulnerabilities.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Vulnerability Detection Method&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Details:dotProject Privilege Escalation Vulnerability&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;OID:1.3.6.1.4.1.25623.1.0.800565&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Version used: $Revision: 2235 $&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;CVE: CVE-2008-6747&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;BID:29679&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Other:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;URL:&lt;A href="http://en.securitylab.ru/nvd/378282.php" target="_blank"&gt;http://en.securitylab.ru/nvd/378282.php&lt;/A&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;URL:&lt;A href="http://xforce.iss.net/xforce/xfdb/43019" target="_blank"&gt;http://xforce.iss.net/xforce/xfdb/43019&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Kindly have a look and do suggest us on the same.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2016 15:59:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Vulnerability-assessment-test/m-p/39124#M23889</guid>
      <dc:creator>steh</dc:creator>
      <dc:date>2016-11-08T15:59:39Z</dc:date>
    </item>
    <item>
      <title>Vulnerability assessment test</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Vulnerability-assessment-test/m-p/39307#M23890</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We ran&amp;nbsp;Vulnerability assessment test and we could see some &lt;SPAN&gt;Vulnerabilities in cloudera. Have mentioned the description of the reported&amp;nbsp;Vulnerabilities.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The host is installed with dotProject and is prone to Privilege Escalation vulnerability.&lt;BR /&gt;Vulnerability Detection Result&lt;BR /&gt;Vulnerability was detected according to the Vulnerability Detection Method.&lt;BR /&gt;Impact&lt;BR /&gt;Attackers can exploit this issue via specially crafted HTTP request to certain administrative&lt;BR /&gt;pages to gain administrative privileges on the a?ected system. Impact Level: Application&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Vulnerability Detection Method&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Details:dotProject Privilege Escalation Vulnerability&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;OID:1.3.6.1.4.1.25623.1.0.800565&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Version used: $Revision: 2235 $&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;CVE: CVE-2008-6747&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;BID:29679&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Other:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;URL:&lt;A href="http://en.securitylab.ru/nvd/378282.php" target="_blank" rel="nofollow"&gt;http://en.securitylab.ru/nvd/378282.php&lt;/A&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;URL:&lt;A href="http://xforce.iss.net/xforce/xfdb/43019" target="_blank" rel="nofollow"&gt;http://xforce.iss.net/xforce/xfdb/43019&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Kindly have a look and do suggest us on the same.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2016 06:22:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Vulnerability-assessment-test/m-p/39307#M23890</guid>
      <dc:creator>steh</dc:creator>
      <dc:date>2016-04-04T06:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment test</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Vulnerability-assessment-test/m-p/39408#M23891</link>
      <description>&lt;P&gt;Sorry for the delay in response&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/10062"&gt;@steh﻿&lt;/a&gt;, I was seeing what I could find out through my contacts.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The response I received is that the CVE that is referred to applies to "dotProject" which is not Cloudera software.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this helps.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 16:27:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Vulnerability-assessment-test/m-p/39408#M23891</guid>
      <dc:creator>cjervis</dc:creator>
      <dc:date>2016-04-06T16:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment test</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Vulnerability-assessment-test/m-p/39449#M23892</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;SPAN class=""&gt;&lt;A href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/10253" target="_blank"&gt;cjervis&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;I fixed that vulnerability issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Yes what you said is correct "dotproject" is not related to cloudera. but whene ever we tested the assessment that time we faced like dot project.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;So, I gave the&amp;nbsp;privileges for 25000 port which impala port. Throught this port only&amp;nbsp;&lt;SPAN&gt;v&lt;/SPAN&gt;&lt;SPAN&gt;ulnerability raised because of&amp;nbsp;&lt;STRONG&gt;Privilege Escalation vulnerability. &lt;/STRONG&gt;Finally it's fixed.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Thanks for your responce&amp;nbsp;&lt;A href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/10253" target="_blank"&gt;cjervis&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2016 12:32:45 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Vulnerability-assessment-test/m-p/39449#M23892</guid>
      <dc:creator>steh</dc:creator>
      <dc:date>2016-04-07T12:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment test</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Vulnerability-assessment-test/m-p/39450#M23893</link>
      <description>&lt;P&gt;I'm happy to hear that you resolved the issue. Feel free to mark your last comment as the solution. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2016 12:38:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Vulnerability-assessment-test/m-p/39450#M23893</guid>
      <dc:creator>cjervis</dc:creator>
      <dc:date>2016-04-07T12:38:18Z</dc:date>
    </item>
  </channel>
</rss>

