First published: Thu Aug 16 2018(Updated: )
Apache Commons Compress is vulnerable to a denial of service, caused by the failure to return the correct EOF indication after the end of the stream has been reached by the ZipArchiveInputStream method. By reading a specially crafted ZIP archive, a remote attacker could exploit this vulnerability to cause the application to enter into an infinite loop.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Commons Compress | >=1.7.0<=1.17.0 | |
Oracle WebLogic Server | =14.1.1.0.0 | |
redhat/apache-commons-compress | <1.18 | 1.18 |
maven/org.apache.commons:commons-compress | >=1.7<1.18 | 1.18 |
>=1.7.0<=1.17.0 | ||
=14.1.1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-11771 is medium with a severity value of 5.5.
CVE-2018-11771 affects Apache Commons Compress versions 1.7 to 1.17 by failing to return the correct EOF indication after reaching the end of the stream, potentially leading to an infinite stream.
Apache Commons Compress versions 1.7 to 1.17, and Oracle WebLogic Server version 14.1.1.0.0 are affected by CVE-2018-11771.
To fix CVE-2018-11771 for Apache Commons Compress, you need to upgrade to version 1.18.
To fix CVE-2018-11771 for Oracle WebLogic Server, you need to apply the necessary patches or updates provided by Oracle.