The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
References
Configurations
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131845.html - Third Party Advisory | |
References | () http://secunia.com/advisories/57791 - Permissions Required, Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2014:079 - Broken Link | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/66715 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1032311 - Issue Tracking | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/92541 - VDB Entry | |
References | () https://github.com/json-c/json-c/commit/64e36901a0614bf64a19bc3396469c66dcd0b015 - Issue Tracking, Patch |
Information
Published : 2014-04-22 13:06
Updated : 2025-04-12 10:46
NVD link : CVE-2013-6371
Mitre link : CVE-2013-6371
CVE.ORG link : CVE-2013-6371
JSON object : View
Products Affected
json-c
- json-c
fedoraproject
- fedora
CWE
CWE-310
Cryptographic Issues