Apache Commons Compress: Denial of service via CPU consumption for malformed TAR file
Description
Improper Input Validation, Uncontrolled Resource Consumption vulnerability in Apache Commons Compress in TAR parsing.This issue affects Apache Commons Compress: from 1.22 before 1.24.0.
Users are recommended to upgrade to version 1.24.0, which fixes the issue.
A third party can create a malformed TAR file by manipulating file modification times headers, which when parsed with Apache Commons Compress, will cause a denial of service issue via CPU consumption.
In version 1.22 of Apache Commons Compress, support was added for file modification times with higher precision (issue # COMPRESS-612 [1]). The format for the PAX extended headers carrying this data consists of two numbers separated by a period [2], indicating seconds and subsecond precision (for example “1647221103.5998539”). The impacted fields are “atime”, “ctime”, “mtime” and “LIBARCHIVE.creationtime”. No input validation is performed prior to the parsing of header values.
Parsing of these numbers uses the BigDecimal [3] class from the JDK which has a publicly known algorithmic complexity issue when doing operations on large numbers, causing denial of service (see issue # JDK-6560193 [4]). A third party can manipulate file time headers in a TAR file by placing a number with a very long fraction (300,000 digits) or a number with exponent notation (such as “9e9999999”) within a file modification time header, and the parsing of files with these headers will take hours instead of seconds, leading to a denial of service via exhaustion of CPU resources. This issue is similar to CVE-2012-2098 [5].
[1]: https://issues.apache.org/jira/browse/COMPRESS-612 [2]: https://pubs.opengroup.org/onlinepubs/9699919799/utilities/pax.html#tag_20_92_13_05 [3]: https://docs.oracle.com/javase/8/docs/api/java/math/BigDecimal.html [4]: https://bugs.openjdk.org/browse/JDK-6560193 [5]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098
Only applications using CompressorStreamFactory class (with auto-detection of file types), TarArchiveInputStream and TarFile classes to parse TAR files are impacted. Since this code was introduced in v1.22, only that version and later versions are impacted.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Malformed TAR file headers cause DoS via CPU exhaustion in Apache Commons Compress versions 1.22 to 1.23.
Vulnerability
Overview
CVE-2023-42503 is an improper input validation and uncontrolled resource consumption vulnerability in Apache Commons Compress, specifically in its TAR parsing functionality. The issue affects versions from 1.22 up to (but not including) 1.24.0. A remote attacker can craft a malformed TAR file with manipulated PAX extended headers for file modification times (such as atime, ctime, mtime, or LIBARCHIVE.creationtime) that lack input validation. Parsing these values uses the Java BigDecimal class, which exhibits known algorithmic complexity issues (JDK-6560193) when handling numbers with very long fractional parts (e.g., 300,000 digits) or exponent notation like 9e9999999, causing CPU exhaustion [1][2].
Exploitation
Details
The attack vector involves a third party supplying a specially crafted TAR file to an application that uses Apache Commons Compress's CompressorStreamFactory with auto-detection or directly invokes TAR archive parsing. No authentication is required beyond the ability to provide such a file (e.g., upload, network share, or email attachment). The parsing of the malicious header consumes excessive CPU resources, effectively causing a Denial of Service (DoS) by making the processing time escalate from seconds to hours [1][2].
Impact
Successful exploitation results in a denial of service via exhaustion of CPU resources. This can degrade or halt the affected application or service, leading to performance degradation or complete unavailability. The issue is similar to CVE-2012-2098, which also involved algorithmic complexity in number parsing [1].
Mitigation
The fix is implemented in Apache Commons Compress version 1.24.0, released on September 14, 2023. Users are strongly advised to upgrade to this version. The commit aae38bfb820159ae7a0b792e779571f6a46b3889 details the patch [2]. No workarounds other than upgrading are mentioned in the advisories. The library source code is available on GitHub [3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.commons:commons-compressMaven | >= 1.22, < 1.24.0 | 1.24.0 |
Affected products
220- osv-coords219 versionspkg:apk/chainguard/hivepkg:apk/chainguard/hive-compatpkg:apk/chainguard/opensearch-2pkg:apk/chainguard/opensearch-2-alertingpkg:apk/chainguard/opensearch-2-analysis-icupkg:apk/chainguard/opensearch-2-analysis-kuromojipkg:apk/chainguard/opensearch-2-analysis-noripkg:apk/chainguard/opensearch-2-analysis-phoneticpkg:apk/chainguard/opensearch-2-analysis-smartcnpkg:apk/chainguard/opensearch-2-analysis-stempelpkg:apk/chainguard/opensearch-2-analysis-ukrainianpkg:apk/chainguard/opensearch-2-anomaly-detectionpkg:apk/chainguard/opensearch-2-asynchronous-searchpkg:apk/chainguard/opensearch-2-cross-cluster-replicationpkg:apk/chainguard/opensearch-2-crypto-kmspkg:apk/chainguard/opensearch-2-custom-codecspkg:apk/chainguard/opensearch-2-discovery-azure-classicpkg:apk/chainguard/opensearch-2-discovery-ec2pkg:apk/chainguard/opensearch-2-discovery-gcepkg:apk/chainguard/opensearch-2-geospatialpkg:apk/chainguard/opensearch-2-identity-shiropkg:apk/chainguard/opensearch-2-index-managementpkg:apk/chainguard/opensearch-2-ingest-attachmentpkg:apk/chainguard/opensearch-2-job-schedulerpkg:apk/chainguard/opensearch-2-k-nnpkg:apk/chainguard/opensearch-2-mapper-annotated-textpkg:apk/chainguard/opensearch-2-mapper-murmur3pkg:apk/chainguard/opensearch-2-mapper-sizepkg:apk/chainguard/opensearch-2-ml-commonspkg:apk/chainguard/opensearch-2-neural-searchpkg:apk/chainguard/opensearch-2-notificationspkg:apk/chainguard/opensearch-2-observabilitypkg:apk/chainguard/opensearch-2-performance-analyzerpkg:apk/chainguard/opensearch-2-reportingpkg:apk/chainguard/opensearch-2-repository-azurepkg:apk/chainguard/opensearch-2-repository-gcspkg:apk/chainguard/opensearch-2-repository-s3pkg:apk/chainguard/opensearch-2-securitypkg:apk/chainguard/opensearch-2-security-analyticspkg:apk/chainguard/opensearch-2-sqlpkg:apk/chainguard/opensearch-2-store-smbpkg:apk/chainguard/opensearch-2-telemetry-otelpkg:apk/chainguard/opensearch-2-transport-niopkg:apk/chainguard/trinopkg:apk/chainguard/trino-configpkg:apk/chainguard/trino-oci-entrypointpkg:apk/chainguard/trino-plugin-accumulopkg:apk/chainguard/trino-plugin-ai-functionspkg:apk/chainguard/trino-plugin-atoppkg:apk/chainguard/trino-plugin-bigquerypkg:apk/chainguard/trino-plugin-blackholepkg:apk/chainguard/trino-plugin-cassandrapkg:apk/chainguard/trino-plugin-clickhousepkg:apk/chainguard/trino-plugin-delta-lakepkg:apk/chainguard/trino-plugin-druidpkg:apk/chainguard/trino-plugin-duckdbpkg:apk/chainguard/trino-plugin-elasticsearchpkg:apk/chainguard/trino-plugin-example-httppkg:apk/chainguard/trino-plugin-exasolpkg:apk/chainguard/trino-plugin-exchange-filesystempkg:apk/chainguard/trino-plugin-exchange-hdfspkg:apk/chainguard/trino-plugin-fakerpkg:apk/chainguard/trino-plugin-functions-pythonpkg:apk/chainguard/trino-plugin-geospatialpkg:apk/chainguard/trino-plugin-google-sheetspkg:apk/chainguard/trino-plugin-hivepkg:apk/chainguard/trino-plugin-http-event-listenerpkg:apk/chainguard/trino-plugin-http-server-event-listenerpkg:apk/chainguard/trino-plugin-hudipkg:apk/chainguard/trino-plugin-icebergpkg:apk/chainguard/trino-plugin-ignitepkg:apk/chainguard/trino-plugin-jmxpkg:apk/chainguard/trino-plugin-kafkapkg:apk/chainguard/trino-plugin-kafka-event-listenerpkg:apk/chainguard/trino-plugin-kinesispkg:apk/chainguard/trino-plugin-kudupkg:apk/chainguard/trino-plugin-lakehousepkg:apk/chainguard/trino-plugin-ldap-group-providerpkg:apk/chainguard/trino-plugin-local-filepkg:apk/chainguard/trino-plugin-lokipkg:apk/chainguard/trino-plugin-mariadbpkg:apk/chainguard/trino-plugin-memorypkg:apk/chainguard/trino-plugin-mlpkg:apk/chainguard/trino-plugin-mongodbpkg:apk/chainguard/trino-plugin-mysqlpkg:apk/chainguard/trino-plugin-mysql-event-listenerpkg:apk/chainguard/trino-plugin-opapkg:apk/chainguard/trino-plugin-openlineagepkg:apk/chainguard/trino-plugin-opensearchpkg:apk/chainguard/trino-plugin-oraclepkg:apk/chainguard/trino-plugin-password-authenticatorspkg:apk/chainguard/trino-plugin-phoenix5pkg:apk/chainguard/trino-plugin-pinotpkg:apk/chainguard/trino-plugin-postgresqlpkg:apk/chainguard/trino-plugin-prometheuspkg:apk/chainguard/trino-plugin-rangerpkg:apk/chainguard/trino-plugin-raptor-legacypkg:apk/chainguard/trino-plugin-redispkg:apk/chainguard/trino-plugin-redshiftpkg:apk/chainguard/trino-plugin-resource-group-managerspkg:apk/chainguard/trino-plugin-session-property-managerspkg:apk/chainguard/trino-plugin-singlestorepkg:apk/chainguard/trino-plugin-snowflakepkg:apk/chainguard/trino-plugin-spooling-filesystempkg:apk/chainguard/trino-plugin-sqlserverpkg:apk/chainguard/trino-plugin-teradata-functionspkg:apk/chainguard/trino-plugin-thriftpkg:apk/chainguard/trino-plugin-tpcdspkg:apk/chainguard/trino-plugin-tpchpkg:apk/chainguard/trino-plugin-verticapkg:apk/wolfi/opensearch-2pkg:apk/wolfi/opensearch-2-alertingpkg:apk/wolfi/opensearch-2-analysis-icupkg:apk/wolfi/opensearch-2-analysis-kuromojipkg:apk/wolfi/opensearch-2-analysis-noripkg:apk/wolfi/opensearch-2-analysis-phoneticpkg:apk/wolfi/opensearch-2-analysis-smartcnpkg:apk/wolfi/opensearch-2-analysis-stempelpkg:apk/wolfi/opensearch-2-analysis-ukrainianpkg:apk/wolfi/opensearch-2-anomaly-detectionpkg:apk/wolfi/opensearch-2-asynchronous-searchpkg:apk/wolfi/opensearch-2-cross-cluster-replicationpkg:apk/wolfi/opensearch-2-crypto-kmspkg:apk/wolfi/opensearch-2-custom-codecspkg:apk/wolfi/opensearch-2-discovery-azure-classicpkg:apk/wolfi/opensearch-2-discovery-ec2pkg:apk/wolfi/opensearch-2-discovery-gcepkg:apk/wolfi/opensearch-2-geospatialpkg:apk/wolfi/opensearch-2-identity-shiropkg:apk/wolfi/opensearch-2-index-managementpkg:apk/wolfi/opensearch-2-ingest-attachmentpkg:apk/wolfi/opensearch-2-job-schedulerpkg:apk/wolfi/opensearch-2-k-nnpkg:apk/wolfi/opensearch-2-mapper-annotated-textpkg:apk/wolfi/opensearch-2-mapper-murmur3pkg:apk/wolfi/opensearch-2-mapper-sizepkg:apk/wolfi/opensearch-2-ml-commonspkg:apk/wolfi/opensearch-2-neural-searchpkg:apk/wolfi/opensearch-2-notificationspkg:apk/wolfi/opensearch-2-observabilitypkg:apk/wolfi/opensearch-2-performance-analyzerpkg:apk/wolfi/opensearch-2-reportingpkg:apk/wolfi/opensearch-2-repository-azurepkg:apk/wolfi/opensearch-2-repository-gcspkg:apk/wolfi/opensearch-2-repository-s3pkg:apk/wolfi/opensearch-2-securitypkg:apk/wolfi/opensearch-2-security-analyticspkg:apk/wolfi/opensearch-2-sqlpkg:apk/wolfi/opensearch-2-store-smbpkg:apk/wolfi/opensearch-2-telemetry-otelpkg:apk/wolfi/opensearch-2-transport-niopkg:apk/wolfi/trinopkg:apk/wolfi/trino-configpkg:apk/wolfi/trino-oci-entrypointpkg:apk/wolfi/trino-plugin-accumulopkg:apk/wolfi/trino-plugin-ai-functionspkg:apk/wolfi/trino-plugin-atoppkg:apk/wolfi/trino-plugin-bigquerypkg:apk/wolfi/trino-plugin-blackholepkg:apk/wolfi/trino-plugin-cassandrapkg:apk/wolfi/trino-plugin-clickhousepkg:apk/wolfi/trino-plugin-delta-lakepkg:apk/wolfi/trino-plugin-druidpkg:apk/wolfi/trino-plugin-duckdbpkg:apk/wolfi/trino-plugin-elasticsearchpkg:apk/wolfi/trino-plugin-example-httppkg:apk/wolfi/trino-plugin-exasolpkg:apk/wolfi/trino-plugin-exchange-filesystempkg:apk/wolfi/trino-plugin-exchange-hdfspkg:apk/wolfi/trino-plugin-fakerpkg:apk/wolfi/trino-plugin-functions-pythonpkg:apk/wolfi/trino-plugin-geospatialpkg:apk/wolfi/trino-plugin-google-sheetspkg:apk/wolfi/trino-plugin-hivepkg:apk/wolfi/trino-plugin-http-event-listenerpkg:apk/wolfi/trino-plugin-http-server-event-listenerpkg:apk/wolfi/trino-plugin-hudipkg:apk/wolfi/trino-plugin-icebergpkg:apk/wolfi/trino-plugin-ignitepkg:apk/wolfi/trino-plugin-jmxpkg:apk/wolfi/trino-plugin-kafkapkg:apk/wolfi/trino-plugin-kafka-event-listenerpkg:apk/wolfi/trino-plugin-kinesispkg:apk/wolfi/trino-plugin-kudupkg:apk/wolfi/trino-plugin-lakehousepkg:apk/wolfi/trino-plugin-ldap-group-providerpkg:apk/wolfi/trino-plugin-local-filepkg:apk/wolfi/trino-plugin-lokipkg:apk/wolfi/trino-plugin-mariadbpkg:apk/wolfi/trino-plugin-memorypkg:apk/wolfi/trino-plugin-mlpkg:apk/wolfi/trino-plugin-mongodbpkg:apk/wolfi/trino-plugin-mysqlpkg:apk/wolfi/trino-plugin-mysql-event-listenerpkg:apk/wolfi/trino-plugin-opapkg:apk/wolfi/trino-plugin-openlineagepkg:apk/wolfi/trino-plugin-opensearchpkg:apk/wolfi/trino-plugin-oraclepkg:apk/wolfi/trino-plugin-password-authenticatorspkg:apk/wolfi/trino-plugin-phoenix5pkg:apk/wolfi/trino-plugin-pinotpkg:apk/wolfi/trino-plugin-postgresqlpkg:apk/wolfi/trino-plugin-prometheuspkg:apk/wolfi/trino-plugin-rangerpkg:apk/wolfi/trino-plugin-raptor-legacypkg:apk/wolfi/trino-plugin-redispkg:apk/wolfi/trino-plugin-redshiftpkg:apk/wolfi/trino-plugin-resource-group-managerspkg:apk/wolfi/trino-plugin-session-property-managerspkg:apk/wolfi/trino-plugin-singlestorepkg:apk/wolfi/trino-plugin-snowflakepkg:apk/wolfi/trino-plugin-spooling-filesystempkg:apk/wolfi/trino-plugin-sqlserverpkg:apk/wolfi/trino-plugin-teradata-functionspkg:apk/wolfi/trino-plugin-thriftpkg:apk/wolfi/trino-plugin-tpcdspkg:apk/wolfi/trino-plugin-tpchpkg:apk/wolfi/trino-plugin-verticapkg:maven/org.apache.commons/commons-compress
< 4.0.1-r1+ 218 more
- (no CPE)range: < 4.0.1-r1
- (no CPE)range: < 4.0.1-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 2.10.0-r1
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: < 444-r0
- (no CPE)range: >= 1.22, < 1.24.0
- Apache Software Foundation/Apache Commons Compressv5Range: 1.22
Patches
1aae38bfb8201Update site for CVE-2023-42503
1 file changed · +30 −0
src/site/xdoc/security.xml+30 −0 modified@@ -54,6 +54,36 @@ the descriptions here are incomplete, please report them privately to the Apache Security Team. Thank you.</p> + <subsection name="Fixed in Apache Commons Compress 1.24.0"> + <p><b>Moderate: Denial of Service</b> <a + href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42503">CVE-2023-42503</a></p> + + <p>Improper Input Validation, Uncontrolled Resource Consumption vulnerability in Apache Commons Compress in TAR parsing.</p> + <p>This issue affects Apache Commons Compress: from 1.22 before 1.24.0.</p> + <p>Users are recommended to upgrade to version 1.24.0, which fixes the issue.</p> + <p>A third party can create a malformed TAR file by manipulating file modification times headers, + which when parsed with Apache Commons Compress, will cause a denial of service issue via CPU consumption.</p> + <p>In version 1.22 of Apache Commons Compress, support was added for file modification times with higher precision + (issue # COMPRESS-612<sup><a href="#Ref-1-24-1">[1]</a></sup>). + The format for the PAX extended headers carrying this data consists of two numbers separated by a period<sup><a href="#Ref-1-24-2">[2]</a></sup>, + indicating seconds and subsecond precision (for example “1647221103.5998539”). The impacted fields are “atime”, “ctime”, “mtime” and + “LIBARCHIVE.creationtime”. No input validation is performed prior to the parsing of header values.</p> + <p>Parsing of these numbers uses the BigDecimal<sup><a href="#Ref-1-24-3">[3]</a></sup> class from the JDK which has a publicly known algorithmic complexity issue when doing + operations on large numbers, causing denial of service (see issue # JDK-6560193<sup><a href="#Ref-1-24-4">[4]</a></sup>). A third party can manipulate file time headers + in a TAR file by placing a number with a very long fraction (300,000 digits) or a number with exponent notation (such as “9e9999999”) + within a file modification time header, and the parsing of files with these headers will take hours instead of seconds, leading to a + denial of service via exhaustion of CPU resources. This issue is similar to CVE-2012-2098<sup><a href="#Ref-1-24-5">[5]</a></sup>.</p> + <ul> + <li id="Ref-1-24-1">[1]: <a href="https://issues.apache.org/jira/browse/COMPRESS-612">COMPRESS-612</a></li> + <li id="Ref-1-24-2">[2]: <a href="https://pubs.opengroup.org/onlinepubs/9699919799/utilities/pax.html#tag_20_92_13_05">PAX extended headers</a></li> + <li id="Ref-1-24-3">[3]: <a href="https://docs.oracle.com/javase/8/docs/api/java/math/BigDecimal.html">BigDecimal</a></li> + <li id="Ref-1-24-4">[4]: <a href="https://bugs.openjdk.org/browse/JDK-6560193">JDK-6560193</a></li> + <li id="Ref-1-24-5">[5]: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098">CVE-2012-2098</a></li> + </ul> + <p>Only applications using CompressorStreamFactory class (with auto-detection of file types), TarArchiveInputStream and TarFile + classes to parse TAR files are impacted. Since this code was introduced in v1.22, only that version and later versions are impacted.</p> + </subsection> + <subsection name="Fixed in Apache Commons Compress 1.21"> <p><b>Low: Denial of Service</b> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35515">CVE-2021-35515</a></p>
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-cgwf-w82q-5jrrghsaADVISORY
- lists.apache.org/thread/5xwcyr600mn074vgxq92tjssrchmc93cghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2023-42503ghsaADVISORY
- github.com/apache/commons-compress/commit/aae38bfb820159ae7a0b792e779571f6a46b3889ghsaWEB
- security.netapp.com/advisory/ntap-20231020-0003ghsaWEB
- security.netapp.com/advisory/ntap-20231020-0003/mitre
News mentions
0No linked articles in our index yet.