-------- Original Message --------Subject: [CVE-2012-2098] Apache Commons Compress and Apache Ant denial of service vulnerability
Date: Wed, 23 May 2012 16:00:48 +0200 From: Stefan Bodewig <bode...@apache.org> Reply-To: Commons Developers List <d...@commons.apache.org>To: d...@commons.apache.org, u...@commons.apache.org, d...@ant.apache.org, u...@ant.apache.org, annou...@apache.org, secur...@apache.org, full-disclos...@lists.grok.org.uk, bugt...@securityfocus.com, David Jorm <dj...@redhat.com>
CVE-2012-2098: Apache Commons Compress and Apache Ant denial of service vulnerability Severity: Low Vendor: The Apache Software Foundation Versions Affected: Apache Commons Compress 1.0 to 1.4 Apache Ant 1.5 to 1.8.3 Description: The bzip2 compressing streams in Apache Commons Compress and Apache Ant internally use sorting algorithms with unacceptable worst-case performance on very repetitive inputs. A specially crafted input to Compress' BZip2CompressorOutputStream or Ant's<bzip2> task can be used to make the process spend a very long time while using up all available processing time effectively leading to a denial of service. Mitigation: Commons Compress users should upgrade to 1.4.1 Ant users should upgrade to 1.8.4 Credit: This issue was discovered by David Jorm of the Red Hat Security Response Team. References: http://commons.apache.org/compress/security.html http://ant.apache.org/security.html Stefan Bodewig
Attached Message Part
Description: PGP signature