Bug 1572424 (CVE-2018-1339) - CVE-2018-1339 tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service
Summary: CVE-2018-1339 tika: Infinite loop in ChmParser can allow remote attacker to c...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-1339
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1572427 1572428
Blocks: 1572420
TreeView+ depends on / blocked
 
Reported: 2018-04-27 01:36 UTC by Sam Fowler
Modified: 2021-02-17 00:24 UTC (History)
40 users (show)

Fixed In Version: tika 1.18
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-06-10 10:20:43 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:2669 0 None None None 2018-09-11 07:55:47 UTC

Description Sam Fowler 2018-04-27 01:36:33 UTC
Apache Tika before version 1.18 has an infinite loop vulnerability in the ChmParser. A remote attacker could exploit this to cause a denial of service via crafted file.


External References:

https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828@%3Cdev.tika.apache.org%3E

Comment 1 Sam Fowler 2018-04-27 01:37:14 UTC
Created tika tracking bugs for this issue:

Affects: fedora-all [bug 1572427]

Comment 7 Doran Moppert 2018-04-30 06:26:06 UTC
Package rh-eclipse46-tika in Red Hat Software Collections does not include the CHM parser which contains this vulnerability.

Comment 8 Andrej Nemec 2018-05-14 15:53:21 UTC
Statement:

This issue affects the versions of tika which is embedded in the nutch package  as shipped with Red Hat Satellite 5. The tika server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Comment 12 errata-xmlrpc 2018-09-11 07:55:25 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Fuse

Via RHSA-2018:2669 https://access.redhat.com/errata/RHSA-2018:2669


Note You need to log in before you can comment on or make changes to this bug.