CVE Vulnerabilities

CVE-2021-36373

Improper Handling of Length Parameter Inconsistency

Published: Jul 14, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.5 LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
LOW

When reading a specially crafted TAR archive an Apache Ant build can be made to allocate large amounts of memory that finally leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Apache Ant prior to 1.9.16 and 1.10.11 were affected.

Weakness

The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.

Affected Software

Name Vendor Start Version End Version
Ant Apache 1.9.0 (including) 1.9.16 (excluding)
Ant Apache 1.10.0 (including) 1.10.11 (excluding)
RHPAM 7.13.0 async RedHat ant *
Ant Ubuntu bionic *
Ant Ubuntu groovy *
Ant Ubuntu hirsute *
Ant Ubuntu impish *
Ant Ubuntu kinetic *
Ant Ubuntu lunar *
Ant Ubuntu mantic *
Ant Ubuntu trusty *
Ant Ubuntu trusty/esm *
Ant Ubuntu xenial *

Potential Mitigations

References