Allocation of Resources Without Limits or Throttling Affecting apache-commons-compress package, versions <0:1.5-4.amzn2.0.2


Severity

Recommended
medium

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.28% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-AMZN2-APACHECOMMONSCOMPRESS-7725249
  • published21 Aug 2024
  • disclosed13 Jul 2021

Introduced: 13 Jul 2021

CVE-2021-36090  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2 apache-commons-compress to version 0:1.5-4.amzn2.0.2 or higher.
This issue was patched in ALAS2-2024-2627.

NVD Description

Note: Versions mentioned in the description apply only to the upstream apache-commons-compress package and not the apache-commons-compress package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2 relevant fixed versions and status.

When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.

References

CVSS Base Scores

version 3.1