Vulnerability Description
In Apache ORC 1.0.0 to 1.4.3 a malformed ORC file can trigger an endlessly recursive function call in the C++ or Java parser. The impact of this bug is most likely denial-of-service against software that uses the ORC file parser. With the C++ parser, the stack overflow might possibly corrupt the stack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Orc | <= 1.4.3 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104215Third Party AdvisoryVDB Entry
- https://orc.apache.org/security/CVE-2018-8015/Vendor Advisory
- http://www.securityfocus.com/bid/104215Third Party AdvisoryVDB Entry
- https://orc.apache.org/security/CVE-2018-8015/Vendor Advisory
FAQ
What is CVE-2018-8015?
CVE-2018-8015 is a vulnerability with a CVSS score of 7.5 (HIGH). In Apache ORC 1.0.0 to 1.4.3 a malformed ORC file can trigger an endlessly recursive function call in the C++ or Java parser. The impact of this bug is most likely denial-of-service against software t...
How severe is CVE-2018-8015?
CVE-2018-8015 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-8015?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Orc.