First published: Fri Mar 16 2018(Updated: )
A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Commons Compress | >=1.11<=1.15 | |
Oracle MySQL Cluster | <=7.4.34 | |
Oracle MySQL Cluster | >=7.5.0<=7.5.24 | |
Oracle MySQL Cluster | >=7.6.0<=7.6.20 | |
Oracle MySQL Cluster | >=8.0.0<=8.0.27 | |
Oracle WebLogic Server | =14.1.1.0.0 | |
maven/io.takari:commons-compress | =1.12 | |
maven/com.liferay:com.liferay.portal.tools.bundle.support | >=3.2.7<3.7.4 | 3.7.4 |
maven/org.apache.commons:commons-compress | >=1.11<1.16 | 1.16 |
>=1.11<=1.15 | ||
<=7.4.34 | ||
>=7.5.0<=7.5.24 | ||
>=7.6.0<=7.6.20 | ||
>=8.0.0<=8.0.27 | ||
=14.1.1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-1324.
Apache Commons Compress versions 1.11 to 1.15, Oracle MySQL Cluster versions 7.4.34 to 7.6.20, and Oracle WebLogic Server version 14.1.1.0.0 are affected by this vulnerability.
The severity of CVE-2018-1324 is medium with a CVSS score of 5.5.
This vulnerability can be exploited by using a specially crafted ZIP archive to cause an infinite loop in the ZipFile and ZipArchiveInputStream classes of Apache Commons Compress.
It is recommended to update to a version of Apache Commons Compress, Oracle MySQL Cluster, or Oracle WebLogic Server that is not affected by this vulnerability.