CVE-2021-36374 in Apache and Oracle Products
Published on July 14, 2021
Apache Ant ZIP, and ZIP based, archive denial of service vulerability
Weakness Type
What is a length manipulation Vulnerability?
The software parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data. If an attacker can manipulate the length parameter associated with an input such that it is inconsistent with the actual length of the input, this can be leveraged to cause the target application to behave in unexpected, and possibly, malicious ways. One of the possible motives for doing so is to pass in arbitrarily large input to the application. Another possible motivation is the modification of application state by including invalid data for subsequent properties of the application. Such weaknesses commonly lead to attacks such as buffer overflows and execution of arbitrary code.
CVE-2021-36374 has been classified to as a length manipulation vulnerability or weakness.
Products Associated with CVE-2021-36374
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-36374 are published in these products:
Affected Versions
Apache Software Foundation Apache Ant:- Version 1.4 and below Apache Ant* is affected.
- Version Apache Ant 1.9.x, <= 1.9.15 is affected.
- Version Apache Ant 1.10.x, <= 1.10.10 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.