You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tika.apache.org by "Thorsten Schäfer (JIRA)" <ji...@apache.org> on 2017/08/24 07:36:00 UTC
[jira] [Created] (TIKA-2446) Tainted Zip file can provoke OOM
errors
Thorsten Schäfer created TIKA-2446:
--------------------------------------
Summary: Tainted Zip file can provoke OOM errors
Key: TIKA-2446
URL: https://issues.apache.org/jira/browse/TIKA-2446
Project: Tika
Issue Type: Bug
Affects Versions: 1.16
Reporter: Thorsten Schäfer
Hi,
using Tika 1.16 with embedded POI 3.17-beta1 we experienced an OutOfMemory error on a Zip file. The suspicious code is in the constructor of FakeZipEntry in line 125. Here a ByteArrayOutputStream of up to 2 GiB in size is opened which will most probably lead to an OutOfMemory. The entry size in the zip file can be easily faked by an attacker.
The code path to FakeZipEntry will be used only if the native java.util.zip.ZipFile implementation already failed to open the (possibly corrupted) Zip. Possibly a more fine grained error analysis could be done in ZipPackage.
I have attached a tweaked zip file that will provoke this error.
{code:java}
public FakeZipEntry(ZipEntry entry, InputStream inp) throws IOException {
super(entry.getName());
// Grab the de-compressed contents for later
ByteArrayOutputStream baos;
long entrySize = entry.getSize();
if (entrySize !=-1) {
if (entrySize>=Integer.MAX_VALUE) {
throw new IOException("ZIP entry size is too large");
}
baos = new ByteArrayOutputStream((int) entrySize);
} else {
baos = new ByteArrayOutputStream();
}
{code}
Kinds,
Thorsten
--
This message was sent by Atlassian JIRA
(v6.4.14#64029)