When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1798 | When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package. |
Github GHSA |
GHSA-mc84-pj99-q6hh | Improper Handling of Length Parameter Inconsistency in Compress |
Fixes
Solution
No solution given by the vendor.
Workaround
Commons Compress users should upgrade to 1.21 or later.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T00:47:43.813Z
Reserved: 2021-07-01T00:00:00
Link: CVE-2021-36090
No data.
Status : Modified
Published: 2021-07-13T08:15:07.310
Modified: 2024-11-21T06:13:08.120
Link: CVE-2021-36090
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA