First published: Fri Mar 04 2022(Updated: )
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache POI | <5.2.1 | |
Netapp Active Iq Unified Manager Linux | ||
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
maven/org.apache.poi:poi-scratchpad | >=3.8-beta1<5.2.1 | 5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26336 is a vulnerability in the HMEF package of poi-scratchpad (Apache POI) that allows an attacker to cause an Out of Memory exception by parsing TNEF files.
Apache POI (up to version 5.2.1), Netapp Active IQ Unified Manager, Apple iPadOS, and Apple watchOS are affected by CVE-2022-26336.
CVE-2022-26336 has a severity rating of 5.5 (Medium).
An attacker can exploit CVE-2022-26336 by providing a specially crafted TNEF file to an application that uses poi-scratchpad to parse TNEF files, causing an Out of Memory exception.
Yes, users should update to a version of Apache POI beyond 5.2.1 to mitigate the vulnerability.