Apache Ant ZIP, and ZIP based, archive denial of service vulerability
CVE-2021-36374

5.5MEDIUM

Key Information:

Vendor
Apache
Vendor
CVE Published:
14 July 2021

Summary

When reading a specially crafted ZIP archive, or a derived formats, an Apache Ant build can be made to allocate large amounts of memory that leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Commonly used derived formats from ZIP archives are for instance JAR files and many office files. Apache Ant prior to 1.9.16 and 1.10.11 were affected.

Affected Version(s)

Apache Ant 1.4

Apache Ant Apache Ant 1.9.x <= 1.9.15

Apache Ant Apache Ant 1.10.x <= 1.10.10

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This issue is similar to https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36090 present in Apache Commons Compress which has been detected by OSS Fuzz.
.