UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 06:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml - Exploit, Third Party Advisory | |
References | () https://github.com/ultrajson/ultrajson/issues/501 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/ultrajson/ultrajson/pull/504 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/ - |
10 Sep 2022, 02:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/ - Mailing List, Patch, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/ - Mailing List, Patch, Third Party Advisory |
03 Aug 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 May 2022, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Apr 2022, 03:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/ - Mailing List, Third Party Advisory |
26 Mar 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Mar 2022, 17:25
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://github.com/ultrajson/ultrajson/pull/504 - Patch, Third Party Advisory | |
References | (MISC) https://github.com/ultrajson/ultrajson/issues/501 - Exploit, Issue Tracking, Third Party Advisory | |
References | (MISC) https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284 - Issue Tracking, Patch, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
27 Feb 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Feb 2022, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Feb 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
07 Feb 2022, 02:15
Type | Values Removed | Values Added |
---|---|---|
Summary | ** DISPUTED ** UltraJSON (aka ujson) 4.0.2 through 5.0.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). NOTE: multiple third parties dispute whether this is a confirmed finding, because the event that caused the Reproducer Testcase to stop indicating a buffer overflow was a change to the AFLplusplus project (5525f8c9ef8bb879dadd0eb942d524827d1b0362), not a change to the UltraJSON project. |
11 Jan 2022, 18:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.5 |
CPE | cpe:2.3:a:ultrajson_project:ultrajson:*:*:*:*:*:python:*:* | |
CWE | CWE-787 | |
References | (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009 - Exploit, Issue Tracking, Third Party Advisory | |
References | (MISC) https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml - Exploit, Third Party Advisory |
01 Jan 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-01 00:15
Updated : 2024-11-21 06:33
NVD link : CVE-2021-45958
Mitre link : CVE-2021-45958
CVE.ORG link : CVE-2021-45958
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
ultrajson_project
- ultrajson
CWE
CWE-787
Out-of-bounds Write