Archive.java in Junrar before 1.0.1, as used in Apache Tika and other products, is affected by a denial of service vulnerability due to an infinite loop when handling corrupt RAR files.
References
Link | Resource |
---|---|
https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817 | Patch Third Party Advisory |
https://github.com/junrar/junrar/pull/8 | Third Party Advisory |
https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817 | Patch Third Party Advisory |
https://github.com/junrar/junrar/pull/8 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817 - Patch, Third Party Advisory | |
References | () https://github.com/junrar/junrar/pull/8 - Third Party Advisory |
Information
Published : 2018-06-14 16:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12418
Mitre link : CVE-2018-12418
CVE.ORG link : CVE-2018-12418
JSON object : View
Products Affected
junrar_project
- junrar
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')