CVE-2018-1324

NameCVE-2018-1324
DescriptionA specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs893174

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libcommons-compress-java (PTS)buster1.18-2+deb10u1fixed
bullseye1.20-1fixed
bookworm1.22-1fixed
sid, trixie1.25.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libcommons-compress-javasourcewheezy(not affected)
libcommons-compress-javasourcejessie(not affected)
libcommons-compress-javasource(unstable)1.13-2893174

Notes

[stretch] - libcommons-compress-java <no-dsa> (Minor issue)
[jessie] - libcommons-compress-java <not-affected> (Vulnerable code introduced later)
[wheezy] - libcommons-compress-java <not-affected> (Vulnerable code introduced later)
Fixed by: https://git-wip-us.apache.org/repos/asf?p=commons-compress.git;a=blobdiff;f=src/main/java/org/apache/commons/compress/archivers/zip/X0017_StrongEncryptionHeader.java;h=acc3b22346b49845e85b5ef27a5814b69e834139;hp=0feb9c98cc622cde1defa3bbd268ef82b4ae5c18;hb=2a2f1dc48e22a34ddb72321a4db211da91aa933b;hpb=dcb0486fb4cb2b6592c04d6ec2edbd3f690df5f2
https://issues.apache.org/jira/browse/COMPRESS-432

Search for package or bug name: Reporting problems