Lucene search

K
amazonAmazonALAS2-2022-1880
HistoryDec 01, 2022 - 8:31 p.m.

Medium: ant

2022-12-0120:31:00
alas.aws.amazon.com
11

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

30.7%

Issue Overview:

When reading a specially crafted ZIP archive, or a derived formats, an Apache Ant build can be made to allocate large amounts of memory that leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Commonly used derived formats from ZIP archives are for instance JAR files and many office files. Apache Ant prior to 1.9.16 and 1.10.11 were affected. (CVE-2021-36374)

Affected Packages:

ant

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update ant to update your system.

New Packages:

noarch:  
    ant-1.9.16-1.amzn2.0.1.noarch  
    ant-jmf-1.9.16-1.amzn2.0.1.noarch  
    ant-swing-1.9.16-1.amzn2.0.1.noarch  
    ant-antlr-1.9.16-1.amzn2.0.1.noarch  
    ant-apache-bsf-1.9.16-1.amzn2.0.1.noarch  
    ant-apache-resolver-1.9.16-1.amzn2.0.1.noarch  
    ant-commons-logging-1.9.16-1.amzn2.0.1.noarch  
    ant-commons-net-1.9.16-1.amzn2.0.1.noarch  
    ant-apache-bcel-1.9.16-1.amzn2.0.1.noarch  
    ant-apache-log4j-1.9.16-1.amzn2.0.1.noarch  
    ant-apache-oro-1.9.16-1.amzn2.0.1.noarch  
    ant-apache-regexp-1.9.16-1.amzn2.0.1.noarch  
    ant-apache-xalan2-1.9.16-1.amzn2.0.1.noarch  
    ant-javamail-1.9.16-1.amzn2.0.1.noarch  
    ant-jdepend-1.9.16-1.amzn2.0.1.noarch  
    ant-jsch-1.9.16-1.amzn2.0.1.noarch  
    ant-junit-1.9.16-1.amzn2.0.1.noarch  
    ant-testutil-1.9.16-1.amzn2.0.1.noarch  
    ant-manual-1.9.16-1.amzn2.0.1.noarch  
    ant-javadoc-1.9.16-1.amzn2.0.1.noarch  
  
src:  
    ant-1.9.16-1.amzn2.0.1.src  

Additional References

Red Hat: CVE-2021-36374

Mitre: CVE-2021-36374

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

30.7%