The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
References
Link | Resource |
---|---|
http://secunia.com/advisories/57791 | Permissions Required Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1032311 | Issue Tracking |
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131845.html | Third Party Advisory |
https://github.com/json-c/json-c/commit/64e36901a0614bf64a19bc3396469c66dcd0b015 | Patch Issue Tracking |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:079 | Broken Link |
http://www.securityfocus.com/bid/66715 | Third Party Advisory VDB Entry |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/92541 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-04-22 06:06
Updated : 2017-08-28 18:33
NVD link : CVE-2013-6371
Mitre link : CVE-2013-6371
JSON object : View
CWE
CWE-310
Cryptographic Issues
Products Affected
json-c_project
- json-c
fedoraproject
- fedora