Miggo Logo

CVE-2021-36373: Improper Handling of Length Parameter Inconsistency in Apache Ant

5.5

CVSS Score
3.1

Basic Information

EPSS Score
0.32988%
Published
8/2/2021
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.ant:antmaven< 1.9.161.9.16
org.apache.ant:antmaven>= 1.10.0, < 1.10.111.10.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is related to the handling of TAR archives and the improper handling of length parameters. Functions responsible for reading TAR archives, such as those in TarInputStream, are likely to be involved. The patch for CVE-2021-36373 likely addresses how these lengths are validated or processed to prevent excessive memory allocation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

W**n r***in* * sp**i*lly *r**t** T*R *r**iv* *n *p**** *nt *uil* **n ** m*** to *llo**t* l*r** *mounts o* m*mory t**t *in*lly l***s to *n out o* m*mory *rror, *v*n *or sm*ll inputs. T*is **n ** us** to *isrupt *uil*s usin* *p**** *nt. *p**** *nt prio

Reasoning

T** vuln*r**ility is r*l*t** to t** **n*lin* o* T*R *r**iv*s *n* t** improp*r **n*lin* o* l*n*t* p*r*m*t*rs. *un*tions r*sponsi*l* *or r***in* T*R *r**iv*s, su** *s t*os* in `T*rInputStr**m`, *r* lik*ly to ** involv**. T** p*t** *or `*V*-****-*****`