Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67721: CWE-201: Insertion of Sensitive Information Into Sent Data in airlift aircompressor

0
Medium
VulnerabilityCVE-2025-67721cvecve-2025-67721cwe-201cwe-125
Published: Fri Dec 12 2025 (12/12/2025, 22:11:10 UTC)
Source: CVE Database V5
Vendor/Project: airlift
Product: aircompressor

Description

Aircompressor is a library with ports of the Snappy, LZO, LZ4, and Zstandard compression algorithms to Java. In versions 3.3 and below, incorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allow remote attackers to read previous buffer contents via crafted compressed input. With certain crafted compressed inputs, elements from the output buffer can end up in the uncompressed output, potentially leaking sensitive data. This is relevant for applications that reuse the same output buffer to uncompress multiple inputs. This can be the case of a web server that allocates a fix-sized buffer for performance purposes. There is similar vulnerability in GHSA-cmp6-m4wj-q63q. This issue is fixed in version 3.4.

AI-Powered Analysis

AILast updated: 12/19/2025, 23:01:31 UTC

Technical Analysis

CVE-2025-67721 affects airlift's aircompressor library, which provides Java ports of popular compression algorithms including Snappy and LZ4. In versions 3.3 and below, the decompressor implementations incorrectly handle malformed compressed inputs. Specifically, when decompressing crafted data, the output buffer—often reused across multiple decompression operations for performance reasons—may inadvertently include residual data from previous decompressions. This occurs because the decompressor does not properly clear or isolate the output buffer before writing new decompressed data, leading to insertion of stale buffer contents into the current output. The vulnerability is classified under CWE-201 (Insertion of Sensitive Information Into Sent Data) and CWE-125 (Out-of-bounds Read), indicating that the decompressor reads beyond intended buffer boundaries and leaks sensitive information. Remote attackers can exploit this by sending specially crafted compressed payloads to vulnerable applications, such as web servers using aircompressor for data processing. The flaw does not require authentication or user interaction, increasing its risk profile. However, it only impacts confidentiality, as it leaks data but does not allow modification or denial of service. The issue is resolved in aircompressor version 3.4, which properly handles buffer reuse and malformed inputs to prevent leakage.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive data leakage from applications using aircompressor versions below 3.4, particularly those that reuse output buffers for decompression to optimize performance. Such leakage could expose confidential information processed or cached in memory, including user data, credentials, or proprietary information. Industries with stringent data protection requirements, such as finance, healthcare, and government, are especially at risk due to potential regulatory and reputational consequences under GDPR. While the vulnerability does not enable code execution or service disruption, the confidentiality breach could facilitate further attacks or compliance violations. Remote exploitation without authentication increases the attack surface, especially for publicly accessible services that decompress untrusted data. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks. Organizations relying on Java-based compression libraries in their infrastructure should assess their exposure and remediate promptly to avoid data leakage incidents.

Mitigation Recommendations

1. Upgrade aircompressor to version 3.4 or later, where the vulnerability is fixed. 2. Audit all applications and services using aircompressor for decompression of untrusted inputs, especially those reusing fixed-size output buffers. 3. Implement input validation and sanity checks on compressed data before decompression to detect malformed or suspicious payloads. 4. Avoid reusing output buffers across decompression operations or ensure buffers are securely cleared before reuse to prevent residual data leakage. 5. Employ runtime memory protection techniques and monitoring to detect anomalous buffer reads or data leakage patterns. 6. Restrict network exposure of services that decompress untrusted inputs, applying strict access controls and network segmentation. 7. Monitor logs and network traffic for unusual compressed data patterns that could indicate exploitation attempts. 8. Incorporate this vulnerability into incident response plans and conduct staff training on secure handling of compressed data streams.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-10T18:46:14.762Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693c99885292e65bc6167f6e

Added to database: 12/12/2025, 10:39:04 PM

Last enriched: 12/19/2025, 11:01:31 PM

Last updated: 2/7/2026, 3:36:34 PM

Views: 128

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats