SB2024072943 - Confluence Data Center and Server update for Apache Commons Compress
Published: July 29, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Resource exhaustion (CVE-ID: CVE-2021-36090)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when processing ZIP archives. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
2) Resource exhaustion (CVE-ID: CVE-2021-35517)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when processing TAR archives. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
3) Resource exhaustion (CVE-ID: CVE-2021-35516)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when processing 7Z archives. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
4) Infinite loop (CVE-ID: CVE-2021-35515)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop when processing 7Z archives. A remote attacker can consume all available system resources and cause denial of service conditions.
5) Resource management error (CVE-ID: CVE-2019-12402)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the file name encoding algorithm can get into an infinite loop when faced with
specially crafted inputs. A remote attacker can choose the file names inside of an archive created by Compress and cause a denial of service condition on the target system.
Remediation
Install update from vendor's website.
References
- https://confluence.atlassian.com/security/security-bulletin-july-16-2024-1417150917.html
- https://jira.atlassian.com/browse/CONFSERVER-96103
- https://jira.atlassian.com/browse/CONFSERVER-96102
- https://jira.atlassian.com/browse/CONFSERVER-96101
- https://jira.atlassian.com/browse/CONFSERVER-96100
- https://jira.atlassian.com/browse/CONFSERVER-96099