CVE-2019-12402

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2019-12402
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-12402.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-12402
Aliases
Published
2019-08-30T09:15:17Z
Modified
2024-06-06T12:26:44.785673Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.

References

Affected packages

Debian:11 / libcommons-compress-java

Package

Name
libcommons-compress-java
Purl
pkg:deb/debian/libcommons-compress-java?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.18-3

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / libcommons-compress-java

Package

Name
libcommons-compress-java
Purl
pkg:deb/debian/libcommons-compress-java?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.18-3

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / libcommons-compress-java

Package

Name
libcommons-compress-java
Purl
pkg:deb/debian/libcommons-compress-java?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.18-3

Ecosystem specific

{
    "urgency": "low"
}

Git / github.com/apache/commons-compress

Affected ranges

Type
GIT
Repo
https://github.com/apache/commons-compress
Events

Affected versions

1.*

1.15-RC1
1.16-RC1
1.16.1-RC1
1.17-RC1
1.18-RC1

rel/1.*

rel/1.15
rel/1.16
rel/1.16.1
rel/1.17
rel/1.18