CVE-2021-36374

Apache Ant ZIP, and ZIP based, archive denial of service vulerability

Description

When reading a specially crafted ZIP archive, or a derived formats, an Apache Ant build can be made to allocate large amounts of memory that leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Commonly used derived formats from ZIP archives are for instance JAR files and many office files. Apache Ant prior to 1.9.16 and 1.10.11 were affected.

Remediation

Workaround:

  • Apache Ant 1.9.x users should upgrade to 1.9.16 or later. Apache Ant 1.10.x users should upgrade to 1.10.11 or later.

Category

5.5
CVSS
Severity: Medium
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.15%
Vendor Advisory apache.org Vendor Advisory apache.org
Affected: Apache Software Foundation Apache Ant
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-36374?
CVE-2021-36374 has been scored as a medium severity vulnerability.
How to fix CVE-2021-36374?
As a workaround for remediating CVE-2021-36374: Apache Ant 1.9.x users should upgrade to 1.9.16 or later. Apache Ant 1.10.x users should upgrade to 1.10.11 or later.
Is CVE-2021-36374 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2021-36374 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-36374?
CVE-2021-36374 affects Apache Software Foundation Apache Ant.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.