CVE-2018-1324

NameCVE-2018-1324
DescriptionA specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs893174

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libcommons-compress-java (PTS)stretch1.13-1vulnerable
buster1.18-2+deb10u1fixed
bullseye1.20-1fixed
bookworm, sid1.21-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libcommons-compress-javasourcewheezy(not affected)
libcommons-compress-javasourcejessie(not affected)
libcommons-compress-javasource(unstable)1.13-2893174

Notes

[stretch] - libcommons-compress-java <no-dsa> (Minor issue)
[jessie] - libcommons-compress-java <not-affected> (Vulnerable code introduced later)
[wheezy] - libcommons-compress-java <not-affected> (Vulnerable code introduced later)
Fixed by: https://git-wip-us.apache.org/repos/asf?p=commons-compress.git;a=blobdiff;f=src/main/java/org/apache/commons/compress/archivers/zip/X0017_StrongEncryptionHeader.java;h=acc3b22346b49845e85b5ef27a5814b69e834139;hp=0feb9c98cc622cde1defa3bbd268ef82b4ae5c18;hb=2a2f1dc48e22a34ddb72321a4db211da91aa933b;hpb=dcb0486fb4cb2b6592c04d6ec2edbd3f690df5f2
https://issues.apache.org/jira/browse/COMPRESS-432

Search for package or bug name: Reporting problems