It was reported [1] that: "The Apache Hadoop RPC protocol is intended to provide bidirectional authentication between clients and servers. However, a malicious server or network attacker can unilaterally disable these authentication checks. This allows for potential reduction in the configured quality of protection of the RPC traffic, and privilege escalation if authentication credentials are passed over RPC." This flaw only affects users who have enabled Hadoop's kerberos security features. This is corrected in upstream versions 0.23.9, 1.2.1, and 2.0.6-alpha. [1] http://seclists.org/fulldisclosure/2013/Aug/251
Upstream patch commit: http://svn.apache.org/viewvc?view=revision&revision=r1500336
This issue has been addressed in following products: RHEV Manager version 3.3 Via RHSA-2014:0037 https://rhn.redhat.com/errata/RHSA-2014-0037.html
This issue has been addressed in following products: Red Hat JBoss AM-Q 6.1.0 Via RHSA-2014:0401 https://rhn.redhat.com/errata/RHSA-2014-0401.html
This issue has been addressed in following products: Red Hat JBoss Fuse 6.1.0 Via RHSA-2014:0400 https://rhn.redhat.com/errata/RHSA-2014-0400.html