The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
References
Link | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131845.html | Third Party Advisory |
http://secunia.com/advisories/57791 | Permissions Required Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:079 | Broken Link |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | Third Party Advisory |
http://www.securityfocus.com/bid/66715 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1032311 | Issue Tracking |
https://exchange.xforce.ibmcloud.com/vulnerabilities/92541 | VDB Entry |
https://github.com/json-c/json-c/commit/64e36901a0614bf64a19bc3396469c66dcd0b015 | Patch Issue Tracking |
Configurations
History
No history.
Information
Published : 2014-04-22 13:06
Updated : 2024-02-04 18:35
NVD link : CVE-2013-6371
Mitre link : CVE-2013-6371
CVE.ORG link : CVE-2013-6371
JSON object : View
Products Affected
fedoraproject
- fedora
json-c
- json-c
CWE
CWE-310
Cryptographic Issues