cvelist/2021/36xxx/CVE-2021-36090.json

111 lines
4.3 KiB
JSON
Raw Normal View History

2021-07-01 08:01:01 +00:00
{
"CVE_data_meta": {
2021-07-13 08:13:08 +01:00
"ASSIGNER": "security@apache.org",
2021-07-01 08:01:01 +00:00
"ID": "CVE-2021-36090",
2021-07-13 08:13:08 +01:00
"STATE": "PUBLIC",
"TITLE": "Apache Commons Compress 1.0 to 1.20 denial of service vulnerability"
2021-07-01 08:01:01 +00:00
},
2021-07-13 08:13:08 +01:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache Commons Compress",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "Apache Commons Compress",
"version_value": "1.20"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This issue was discovered by OSS Fuzz."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-07-01 08:01:01 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-07-13 08:00:59 +00:00
"value": "When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package."
2021-07-01 08:01:01 +00:00
}
]
2021-07-13 08:13:08 +01:00
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": [
{}
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-130 Improper Handling of Length Parameter Inconsistency "
}
]
}
]
},
"references": {
"reference_data": [
{
2021-07-13 08:00:59 +00:00
"refsource": "MISC",
"url": "https://commons.apache.org/proper/commons-compress/security-reports.html",
"name": "https://commons.apache.org/proper/commons-compress/security-reports.html"
2021-07-13 08:13:08 +01:00
},
{
2021-07-13 08:00:59 +00:00
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E",
"name": "https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E"
2021-07-13 09:00:49 +00:00
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210713 CVE-2021-36090: Apache Commons Compress 1.0 to 1.20 denial of service vulnerability",
"url": "http://www.openwall.com/lists/oss-security/2021/07/13/4"
2021-07-13 17:00:55 +00:00
},
{
"refsource": "MLIST",
"name": "[announce] 20210713 CVE-2021-36090: Apache Commons Compress 1.0 to 1.20 denial of service vulnerability",
"url": "https://lists.apache.org/thread.html/r9a23d4dbf4e34d498664080bff59f2893b855eb16dae33e4aa92fa53@%3Cannounce.apache.org%3E"
2021-07-13 19:00:48 +00:00
},
{
"refsource": "MLIST",
"name": "[ant-user] 20210713 CVE-2021-36374: Apache Ant ZIP, and ZIP based, archive denial of service vulerability",
"url": "https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38@%3Cuser.ant.apache.org%3E"
2021-07-13 20:00:49 +00:00
},
{
"refsource": "MLIST",
"name": "[announce] 20210713 CVE-2021-36374: Apache Ant ZIP, and ZIP based, archive denial of service vulerability",
"url": "https://lists.apache.org/thread.html/r0e87177f8e78b4ee453cd4d3d8f4ddec6f10d2c27707dd71e12cafc9@%3Cannounce.apache.org%3E"
2021-07-13 08:13:08 +01:00
}
]
},
"source": {
"discovery": "UNKNOWN"
},
"work_around": [
{
"lang": "eng",
"value": "Commons Compress users should upgrade to 1.21 or later."
}
]
2021-07-13 08:00:59 +00:00
}