1.27.1
15 years ago
4 months ago
Known vulnerabilities in the org.apache.commons:commons-compress package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Infinite loop due to the improper handling of certain inputs during the parsing of dump files. An attacker can cause the application to enter an infinite loop by supplying crafted inputs. How to fix Infinite loop? Upgrade | [1.3,1.26.0) |
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package. How to fix Denial of Service (DoS)? Upgrade | [1.6,1.21) |
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package. How to fix Denial of Service (DoS)? Upgrade | [1.1,1.21) |
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package. How to fix Denial of Service (DoS)? Upgrade | [1.6,1.21) |
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package. How to fix Denial of Service (DoS)? Upgrade | [1.0,1.21) |
org.apache.commons:commons-compress is a API for working with compression and archive formats. Affected versions of this package are vulnerable to Denial of Service (DoS) due to Uncontrolled Resource Consumption. The file name encoding algorithm can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress. How to fix Denial of Service (DoS)? Upgrade | [1.15,1.19) |