CVE Vulnerabilities

CVE-2021-36090

Improper Handling of Length Parameter Inconsistency

Published: Jul 13, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress zip package.

Weakness

The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.

Affected Software

NameVendorStart VersionEnd Version
Commons_compressApache1.0 (including)1.21 (excluding)
Red Hat Fuse 7.11RedHatapache-commons-compress*
Red Hat Virtualization Engine 4.4RedHatapache-commons-compress-0:1.21-1.2.el8ev*
Libcommons-compress-javaUbuntubionic*
Libcommons-compress-javaUbuntufocal*
Libcommons-compress-javaUbuntugroovy*
Libcommons-compress-javaUbuntuhirsute*
Libcommons-compress-javaUbuntuimpish*
Libcommons-compress-javaUbuntukinetic*
Libcommons-compress-javaUbuntulunar*
Libcommons-compress-javaUbuntumantic*
Libcommons-compress-javaUbuntuoracular*
Libcommons-compress-javaUbuntuplucky*
Libcommons-compress-javaUbuntutrusty*
Libcommons-compress-javaUbuntuxenial*

Potential Mitigations

References