U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-23953 Detail

Description

Use of Arrays.equals() in LlapSignerImpl in Apache Hive to compare message signatures allows attacker to forge a valid signature for an arbitrary message byte by byte. The attacker should be an authorized user of the product to perform this attack. Users are recommended to upgrade to version 4.0.0, which fixes this issue. The problem occurs when an application doesn’t use a constant-time algorithm for validating a signature. The method Arrays.equals() returns false right away when it sees that one of the input’s bytes are different. It means that the comparison time depends on the contents of the arrays. This little thing may allow an attacker to forge a valid signature for an arbitrary message byte by byte. So it might allow malicious users to submit splits/work with selected signatures to LLAP without running as a privileged user, potentially leading to DDoS attack. More details in the reference section.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://www.openwall.com/lists/oss-security/2025/01/28/3
https://blog.gypsyengineer.com/en/security/preventing-timing-attacks-with-codeql.html
https://cqr.company/web-vulnerabilities/timing-attacks/
https://github.com/apache/hive
https://github.com/apache/hive/commit/b418e3c9f479ba8e7d31e6470306111002ffa809
https://issues.apache.org/jira/browse/HIVE-28030
https://lists.apache.org/thread/0nloywj49nbtlc6l3c6363qvq7o1ztb7

Weakness Enumeration

CWE-ID CWE Name Source
CWE-208 Observable Timing Discrepancy Apache Software Foundation  

Change History

4 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-23953
NVD Published Date:
01/28/2025
NVD Last Modified:
02/18/2025
Source:
Apache Software Foundation