Buffer Overflow Affecting orc package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
4.15% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CONAN-ORC-10078649
  • published8 May 2025
  • disclosed18 May 2018
  • creditUnknown

Introduced: 18 May 2018

CVE-2018-8015  (opens in a new tab)
CWE-674  (opens in a new tab)

How to fix?

There is no fixed version for orc.

Overview

Affected versions of this package are vulnerable to Buffer Overflow. In Apache ORC 1.0.0 to 1.4.3 a malformed ORC file can trigger an endlessly recursive function call in the C++ or Java parser. The impact of this bug is most likely denial-of-service against software that uses the ORC file parser. With the C++ parser, the stack overflow might possibly corrupt the stack.

References

CVSS Base Scores

version 3.1