First published: Thu Mar 01 2012(Updated: )
A flaw was found in the way Apache POI, the Java API for Microsoft Office file formats, handles memory when processing certain Channel Definition Format (CDF) / Compound File Binary Format (CFBF) documents. Apache POI allocates arrays with arbitrary sizes specified in the document. A remote attacker could exploit this flaw by providing a specially-crafted CDF / CFBF file to an application using Apache POI, leading to an to OutOfMemoryError exception in the current thread, or potentially destabilization of the whole Java Virtual Machine instance.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.poi:poi-scratchpad | <3.10-beta1 | 3.10-beta1 |
maven/org.apache.poi:poi | <3.10-beta1 | 3.10-beta1 |
Apache POI | <=3.8 | |
Apache POI | =0.1 | |
Apache POI | =0.2 | |
Apache POI | =0.3 | |
Apache POI | =0.4 | |
Apache POI | =0.5 | |
Apache POI | =0.6 | |
Apache POI | =0.7 | |
Apache POI | =0.10.0 | |
Apache POI | =0.11.0 | |
Apache POI | =0.12.0 | |
Apache POI | =0.13.0 | |
Apache POI | =0.14.0 | |
Apache POI | =1.0.0 | |
Apache POI | =1.0.1 | |
Apache POI | =1.0.2 | |
Apache POI | =1.1.0 | |
Apache POI | =1.2.0 | |
Apache POI | =1.5 | |
Apache POI | =1.5.1 | |
Apache POI | =1.7-dev | |
Apache POI | =1.8-dev | |
Apache POI | =1.10-dev | |
Apache POI | =2.0 | |
Apache POI | =2.0-pre1 | |
Apache POI | =2.0-pre2 | |
Apache POI | =2.0-pre3 | |
Apache POI | =2.0-rc1 | |
Apache POI | =2.0-rc2 | |
Apache POI | =2.5 | |
Apache POI | =2.5.1 | |
Apache POI | =3.0 | |
Apache POI | =3.0-alpha1 | |
Apache POI | =3.0-alpha2 | |
Apache POI | =3.0-alpha3 | |
Apache POI | =3.0.1 | |
Apache POI | =3.0.2 | |
Apache POI | =3.0.2-beta1 | |
Apache POI | =3.0.2-beta2 | |
Apache POI | =3.1 | |
Apache POI | =3.1-beta1 | |
Apache POI | =3.1-beta2 | |
Apache POI | =3.2 | |
Apache POI | =3.5 | |
Apache POI | =3.5-beta1 | |
Apache POI | =3.5-beta2 | |
Apache POI | =3.5-beta3 | |
Apache POI | =3.5-beta4 | |
Apache POI | =3.5-beta5 | |
Apache POI | =3.5-beta6 | |
Apache POI | =3.6 | |
Apache POI | =3.7 | |
Apache POI | =3.7-beta1 | |
Apache POI | =3.7-beta2 | |
Apache POI | =3.7-beta3 | |
Apache POI | =3.8-beta1 | |
Apache POI | =3.8-beta2 | |
Apache POI | =3.8-beta3 | |
Apache POI | =3.8-beta4 | |
Apache POI | =3.8-beta5 | |
<=3.8 | ||
=0.1 | ||
=0.2 | ||
=0.3 | ||
=0.4 | ||
=0.5 | ||
=0.6 | ||
=0.7 | ||
=0.10.0 | ||
=0.11.0 | ||
=0.12.0 | ||
=0.13.0 | ||
=0.14.0 | ||
=1.0.0 | ||
=1.0.1 | ||
=1.0.2 | ||
=1.1.0 | ||
=1.2.0 | ||
=1.5 | ||
=1.5.1 | ||
=1.7-dev | ||
=1.8-dev | ||
=1.10-dev | ||
=2.0 | ||
=2.0-pre1 | ||
=2.0-pre2 | ||
=2.0-pre3 | ||
=2.0-rc1 | ||
=2.0-rc2 | ||
=2.5 | ||
=2.5.1 | ||
=3.0 | ||
=3.0-alpha1 | ||
=3.0-alpha2 | ||
=3.0-alpha3 | ||
=3.0.1 | ||
=3.0.2 | ||
=3.0.2-beta1 | ||
=3.0.2-beta2 | ||
=3.1 | ||
=3.1-beta1 | ||
=3.1-beta2 | ||
=3.2 | ||
=3.5 | ||
=3.5-beta1 | ||
=3.5-beta2 | ||
=3.5-beta3 | ||
=3.5-beta4 | ||
=3.5-beta5 | ||
=3.5-beta6 | ||
=3.6 | ||
=3.7 | ||
=3.7-beta1 | ||
=3.7-beta2 | ||
=3.7-beta3 | ||
=3.8-beta1 | ||
=3.8-beta2 | ||
=3.8-beta3 | ||
=3.8-beta4 | ||
=3.8-beta5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.