CVE Vulnerabilities

CVE-2021-36374

Improper Handling of Length Parameter Inconsistency

Published: Jul 14, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.5 LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
LOW

When reading a specially crafted ZIP archive, or a derived formats, an Apache Ant build can be made to allocate large amounts of memory that leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Commonly used derived formats from ZIP archives are for instance JAR files and many office files. Apache Ant prior to 1.9.16 and 1.10.11 were affected.

Weakness

The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.

Affected Software

Name Vendor Start Version End Version
Ant Apache 1.9.0 (including) 1.9.16 (excluding)
Ant Apache 1.10.0 (including) 1.10.11 (excluding)
Ant Ubuntu bionic *
Ant Ubuntu groovy *
Ant Ubuntu hirsute *
Ant Ubuntu impish *
Ant Ubuntu kinetic *
Ant Ubuntu lunar *
Ant Ubuntu mantic *
Ant Ubuntu trusty *
Ant Ubuntu trusty/esm *
Ant Ubuntu xenial *

Potential Mitigations

References