org.apache.commons:commons-compress@1.18 vulnerabilities

  • latest version

    1.27.1

  • latest non vulnerable version

  • first published

    15 years ago

  • latest version published

    4 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.commons:commons-compress package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Infinite loop

    org.apache.commons:commons-compress is an API for working with compression and archive formats.

    Affected versions of this package are vulnerable to Infinite loop due to the improper handling of certain inputs during the parsing of dump files. An attacker can cause the application to enter an infinite loop by supplying crafted inputs.

    How to fix Infinite loop?

    Upgrade org.apache.commons:commons-compress to version 1.26.0 or higher.

    [1.3,1.26.0)
    • M
    Denial of Service (DoS)

    org.apache.commons:commons-compress is an API for working with compression and archive formats.

    Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

    [1.6,1.21)
    • M
    Denial of Service (DoS)

    org.apache.commons:commons-compress is an API for working with compression and archive formats.

    Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

    [1.1,1.21)
    • M
    Denial of Service (DoS)

    org.apache.commons:commons-compress is an API for working with compression and archive formats.

    Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

    [1.6,1.21)
    • H
    Denial of Service (DoS)

    org.apache.commons:commons-compress is an API for working with compression and archive formats.

    Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

    [1.0,1.21)
    • H
    Denial of Service (DoS)

    org.apache.commons:commons-compress is a API for working with compression and archive formats.

    Affected versions of this package are vulnerable to Denial of Service (DoS) due to Uncontrolled Resource Consumption. The file name encoding algorithm can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.commons:commons-compress to version 1.19 or higher.

    [1.15,1.19)