The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
                
            References
                    | Link | Resource | 
|---|---|
| http://secunia.com/advisories/57791 | Permissions Required Third Party Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=1032311 | Issue Tracking | 
| http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131845.html | Third Party Advisory | 
| https://github.com/json-c/json-c/commit/64e36901a0614bf64a19bc3396469c66dcd0b015 | Patch Issue Tracking | 
| http://www.mandriva.com/security/advisories?name=MDVSA-2014:079 | Broken Link | 
| http://www.securityfocus.com/bid/66715 | Third Party Advisory VDB Entry | 
| http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | Third Party Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/92541 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Information
                Published : 2014-04-22 06:06
Updated : 2017-08-28 18:33
NVD link : CVE-2013-6371
Mitre link : CVE-2013-6371
JSON object : View
CWE
                
                    
                        
                        CWE-310
                        
            Cryptographic Issues
Products Affected
                json-c_project
- json-c
fedoraproject
- fedora


