CWE
20 770
Advisory Published
Advisory Published
Updated

CVE-2022-26336: A carefully crafted TNEF file can cause an out of memory exception

First published: Fri Mar 04 2022(Updated: )

A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.

Credit: security@apache.org security@apache.org

Affected SoftwareAffected VersionHow to fix
Apache POI<5.2.1
Netapp Active Iq Unified Manager Linux
Netapp Active Iq Unified Manager Vmware Vsphere
Netapp Active Iq Unified Manager Windows
maven/org.apache.poi:poi-scratchpad>=3.8-beta1<5.2.1
5.2.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2022-26336?

    CVE-2022-26336 is a vulnerability in the HMEF package of poi-scratchpad (Apache POI) that allows an attacker to cause an Out of Memory exception by parsing TNEF files.

  • What software is affected by CVE-2022-26336?

    Apache POI (up to version 5.2.1), Netapp Active IQ Unified Manager, Apple iPadOS, and Apple watchOS are affected by CVE-2022-26336.

  • How severe is CVE-2022-26336?

    CVE-2022-26336 has a severity rating of 5.5 (Medium).

  • How can an attacker exploit CVE-2022-26336?

    An attacker can exploit CVE-2022-26336 by providing a specially crafted TNEF file to an application that uses poi-scratchpad to parse TNEF files, causing an Out of Memory exception.

  • Is there a fix available for CVE-2022-26336?

    Yes, users should update to a version of Apache POI beyond 5.2.1 to mitigate the vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203