CVE-2016-4303

The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex character in a JSON string, which triggers a heap-based buffer overflow.
References
Link Resource
http://blog.talosintel.com/2016/06/esnet-vulnerability.html Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-08/msg00082.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-08/msg00090.html Mailing List Third Party Advisory
http://software.es.net/iperf/news.html#security-issue-iperf-3-1-3-iperf-3-0-12-released Release Notes Third Party Advisory
http://www.talosintelligence.com/reports/TALOS-2016-0164/ Exploit Third Party Advisory
https://github.com/esnet/iperf/commit/91f2fa59e8ed80dfbf400add0164ee0e508e412a Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/01/msg00023.html Mailing List Third Party Advisory
https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secadv-2016-0001.txt.asc Third Party Advisory
http://blog.talosintel.com/2016/06/esnet-vulnerability.html Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-08/msg00082.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-08/msg00090.html Mailing List Third Party Advisory
http://software.es.net/iperf/news.html#security-issue-iperf-3-1-3-iperf-3-0-12-released Release Notes Third Party Advisory
http://www.talosintelligence.com/reports/TALOS-2016-0164/ Exploit Third Party Advisory
https://github.com/esnet/iperf/commit/91f2fa59e8ed80dfbf400add0164ee0e508e412a Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/01/msg00023.html Mailing List Third Party Advisory
https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secadv-2016-0001.txt.asc Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:iperf3_project:iperf3:*:*:*:*:*:*:*:*
cpe:2.3:a:iperf3_project:iperf3:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:51

Type Values Removed Values Added
References () http://blog.talosintel.com/2016/06/esnet-vulnerability.html - Exploit, Third Party Advisory () http://blog.talosintel.com/2016/06/esnet-vulnerability.html - Exploit, Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2016-08/msg00082.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2016-08/msg00082.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2016-08/msg00090.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2016-08/msg00090.html - Mailing List, Third Party Advisory
References () http://software.es.net/iperf/news.html#security-issue-iperf-3-1-3-iperf-3-0-12-released - Release Notes, Third Party Advisory () http://software.es.net/iperf/news.html#security-issue-iperf-3-1-3-iperf-3-0-12-released - Release Notes, Third Party Advisory
References () http://www.talosintelligence.com/reports/TALOS-2016-0164/ - Exploit, Third Party Advisory () http://www.talosintelligence.com/reports/TALOS-2016-0164/ - Exploit, Third Party Advisory
References () https://github.com/esnet/iperf/commit/91f2fa59e8ed80dfbf400add0164ee0e508e412a - Patch, Third Party Advisory () https://github.com/esnet/iperf/commit/91f2fa59e8ed80dfbf400add0164ee0e508e412a - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/01/msg00023.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/01/msg00023.html - Mailing List, Third Party Advisory
References () https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secadv-2016-0001.txt.asc - Third Party Advisory () https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secadv-2016-0001.txt.asc - Third Party Advisory

30 Jun 2022, 15:13

Type Values Removed Values Added
References (CONFIRM) https://github.com/esnet/iperf/commit/91f2fa59e8ed80dfbf400add0164ee0e508e412a - (CONFIRM) https://github.com/esnet/iperf/commit/91f2fa59e8ed80dfbf400add0164ee0e508e412a - Patch, Third Party Advisory
References (CONFIRM) http://software.es.net/iperf/news.html#security-issue-iperf-3-1-3-iperf-3-0-12-released - (CONFIRM) http://software.es.net/iperf/news.html#security-issue-iperf-3-1-3-iperf-3-0-12-released - Release Notes, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-08/msg00090.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2016-08/msg00090.html - Mailing List, Third Party Advisory
References (CONFIRM) https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secadv-2016-0001.txt.asc - (CONFIRM) https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secadv-2016-0001.txt.asc - Third Party Advisory
References (MISC) http://www.talosintelligence.com/reports/TALOS-2016-0164/ - (MISC) http://www.talosintelligence.com/reports/TALOS-2016-0164/ - Exploit, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/01/msg00023.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/01/msg00023.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-08/msg00082.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2016-08/msg00082.html - Mailing List, Third Party Advisory
References (MISC) http://blog.talosintel.com/2016/06/esnet-vulnerability.html - (MISC) http://blog.talosintel.com/2016/06/esnet-vulnerability.html - Exploit, Third Party Advisory
CPE cpe:2.3:a:iperf_project:iperf:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:iperf3_project:iperf3:*:*:*:*:*:*:*:*
CWE CWE-119 CWE-120

Information

Published : 2016-09-26 14:59

Updated : 2024-11-21 02:51


NVD link : CVE-2016-4303

Mitre link : CVE-2016-4303

CVE.ORG link : CVE-2016-4303


JSON object : View

Products Affected

debian

  • debian_linux

opensuse

  • opensuse
  • leap

novell

  • suse_package_hub_for_suse_linux_enterprise

iperf3_project

  • iperf3
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')