org.apache.commons:commons-compress@1.0 vulnerabilities

  • latest version

    1.27.1

  • latest non vulnerable version

  • first published

    15 years ago

  • latest version published

    4 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.commons:commons-compress package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Denial of Service (DoS)

    org.apache.commons:commons-compress is an API for working with compression and archive formats.

    Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

    [1.0,1.21)
    • M
    Denial of Service (DoS)

    org.apache.commons:commons-compress is an API for working with compression and archive formats.

    Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted ZIP archive, the read method might fail to return the correct EOF indication after the end of the stream has been reached. If it combined with a java.io.InputStreamReader, it can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package.

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.commons:commons-compress to version 1.18-RC1 or higher.

    [,1.18-RC1)
    • M
    Denial of Service (DoS)

    org.apache.commons:commons-compress is an API for working with compression and archive formats.

    Affected versions of this package are vulnerable to Denial of Service (DoS). Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compressing stream (BZip2CompressorOutputStream) allows remote attackers to cause a denial of service (CPU consumption) via a file with many repeating inputs.

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.commons:commons-compress to version 1.4.1 or higher.

    [1.0,1.4.1)