VYPR
Moderate severityNVD Advisory· Published Aug 16, 2018· Updated Sep 16, 2024

CVE-2018-11771

CVE-2018-11771

Description

When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17's ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Commons Compress 1.7 to 1.17 fails to signal EOF when reading crafted ZIP archives, allowing an infinite stream leading to denial of service.

Vulnerability

In Apache Commons Compress versions 1.7 through 1.17, the ZipArchiveInputStream.read() method does not correctly return an end-of-file (EOF) indication when the end of a specially crafted ZIP archive has been reached. This flaw manifests when the method is used in combination with a java.io.InputStreamReader, which can then treat the stream as infinite and continue reading indefinitely [1].

Exploitation

An attacker must supply a maliciously crafted ZIP archive to a service or application that uses the affected ZipArchiveInputStream from Apache Commons Compress. The attack does not require authentication if the service accepts arbitrary ZIP files. Once the archive is parsed, the InputStreamReader will not detect the end of the stream, causing the reading process to loop infinitely without termination [1].

Impact

Successful exploitation results in a denial of service (DoS) condition. The infinite stream consumes CPU resources and can block the thread performing the read operation, potentially making the targeted service unresponsive or causing resource exhaustion on the host system [1].

Mitigation

The vulnerability is fixed in Apache Commons Compress version 1.18, released on 2018-08-09. All users should upgrade to this version or later to eliminate the vulnerability. No known workarounds exist for earlier versions. There is no indication that this issue has been exploited in the wild or added to the CISA Known Exploited Vulnerabilities catalog [1][2].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.commons:commons-compressMaven
>= 1.7, < 1.181.18

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

33

News mentions

0

No linked articles in our index yet.