Bug 1618573 (CVE-2018-11771)

Summary: CVE-2018-11771 apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, alazarot, anstephe, apevec, bbuckingham, bcourt, bkearney, bmcclain, btotty, cbyrne, chazlett, chrisw, cmacedo, dblechte, dfediuck, dffrench, drieden, drusso, eedri, etirelli, gvarsami, hhorak, hhudgeon, ibek, java-maint, java-sig-commits, jcoleman, jjoyce, jmadigan, jolee, jorton, jschatte, jschluet, jshepherd, jstastny, kbasil, kconner, krathod, kverlaen, ldimaggi, lgriffin, lhh, loleary, lpeer, lzap, markmc, mburns, mgoldboi, michal.skrivanek, mizdebsk, mkolesni, mmccune, ngough, nmoumoul, nwallace, ohadlevy, paradhya, pwright, rbryant, rchan, rjerrido, rrajasek, rsynek, rwagner, rzhang, sandro, sbonazzo, sclewis, sdaley, sherold, sisharma, slinaber, sokeeffe, SpikeFedora, spinder, tcunning, tdecacqu, theute, tkirby, trepel, vbellur, vhalbert, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: apache-commons-compress 1.18 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-03-26 16:31:57 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1618574, 1618575, 1625463, 1625464, 1640713, 1640717, 1640719, 1651412    
Bug Blocks: 1618576    

Description Sam Fowler 2018-08-17 02:22:45 UTC
Apache Commons Compress versions 1.7 to 1.17 are vulnerable to a denial of service attack via crafted ZIP archive. When reading a specially crafted ZIP archive, the read method of ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached.  When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package.


External Reference:

https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E

Comment 1 Sam Fowler 2018-08-17 02:23:02 UTC
Created apache-commons-compress tracking bugs for this issue:

Affects: fedora-all [bug 1618574]

Comment 8 Joshua Padman 2019-05-15 22:49:39 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Fuse Service Works 6
 * Red Hat JBoss Fuse 6
 * Red Hat JBoss Data Virtualization & Services 6
 * Red Hat JBoss BPM Suite 6
 * Red Hat JBoss BRMS 6
 * Red Hat JBoss Operations Network 3

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 9 Jason Shepherd 2019-08-08 05:48:13 UTC
This vulnerability is out of security support scope for the following product:

 * Red Hat Mobile Application Platform

 Please refer to https://access.redhat.com/support/policy/updates/rhmap for more details

Comment 10 Joshua Padman 2019-08-12 01:37:32 UTC
This vulnerability is out of security support scope for the following products:
 * JBoss Developer Studio 11

Please refer to https://access.redhat.com/node/4027141 for more details.

Comment 12 errata-xmlrpc 2020-03-26 15:47:19 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.6.0

Via RHSA-2020:0983 https://access.redhat.com/errata/RHSA-2020:0983

Comment 13 Product Security DevOps Team 2020-03-26 16:31:57 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-11771

Comment 14 Yadnyawalk Tale 2020-04-21 09:33:12 UTC
Satellite 6.0 was shipping lucene4-contrib which has commons-compress embedded. It is EOL on February 21, 2018.
~~~
[ytale@cordelia manifests]$ cat manifest-eol.txt | grep satellite | grep commons-compres
manifest-eol.txt:14677:rhn_satellite:6.0/lucene4-contrib-4.6.1-1.el6sat.noarch.rpm/Commons Compress/1.4.1/commons-compress-1.4.1.jar
~~~

Ref - https://access.redhat.com/support/policy/updates/satellite/