CVE-2019-12402
Published: 30 August 2019
The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.
Priority
Status
Package | Release | Status |
---|---|---|
libcommons-compress-java Launchpad, Ubuntu, Debian |
bionic |
Needed
|
disco |
Ignored
(end of life)
|
|
eoan |
Not vulnerable
(1.18-3)
|
|
focal |
Not vulnerable
(1.18-3)
|
|
groovy |
Not vulnerable
(1.18-3)
|
|
hirsute |
Not vulnerable
(1.18-3)
|
|
impish |
Not vulnerable
(1.18-3)
|
|
jammy |
Not vulnerable
(1.18-3)
|
|
kinetic |
Not vulnerable
(1.18-3)
|
|
lunar |
Not vulnerable
(1.18-3)
|
|
mantic |
Not vulnerable
(1.18-3)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(1.18-3)
|
|
xenial |
Not vulnerable
(code not present)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |