ALT-PU-2020-2322-2
Closed vulnerabilities
Published: 2020-05-11
BDU:2021-03538
Уязвимость множества компонентов библиотеки для обработки JSON файлов на языке С JSON-C, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Severity: HIGH (8.8)
Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity: MEDIUM (6.8)
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
References:
Published: 2014-04-22
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2013-6370
Buffer overflow in the printbuf APIs in json-c before 0.12 allows remote attackers to cause a denial of service via unspecified vectors.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
References:
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131845.html
- http://secunia.com/advisories/57791
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:079
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/66720
- https://bugzilla.redhat.com/show_bug.cgi?id=1032322
- https://exchange.xforce.ibmcloud.com/vulnerabilities/92540
- https://github.com/json-c/json-c/commit/64e36901a0614bf64a19bc3396469c66dcd0b015
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131845.html
- http://secunia.com/advisories/57791
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:079
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/66720
- https://bugzilla.redhat.com/show_bug.cgi?id=1032322
- https://exchange.xforce.ibmcloud.com/vulnerabilities/92540
- https://github.com/json-c/json-c/commit/64e36901a0614bf64a19bc3396469c66dcd0b015
Published: 2014-04-22
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2013-6371
The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
References:
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131845.html
- http://secunia.com/advisories/57791
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:079
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/66715
- https://bugzilla.redhat.com/show_bug.cgi?id=1032311
- https://exchange.xforce.ibmcloud.com/vulnerabilities/92541
- https://github.com/json-c/json-c/commit/64e36901a0614bf64a19bc3396469c66dcd0b015
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131845.html
- http://secunia.com/advisories/57791
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:079
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/66715
- https://bugzilla.redhat.com/show_bug.cgi?id=1032311
- https://exchange.xforce.ibmcloud.com/vulnerabilities/92541
- https://github.com/json-c/json-c/commit/64e36901a0614bf64a19bc3396469c66dcd0b015
Published: 2020-05-09
Modified: 2025-05-30
Modified: 2025-05-30
CVE-2020-12762
json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
Severity: MEDIUM (6.8)
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Severity: HIGH (7.8)
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
References:
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://github.com/json-c/json-c/pull/592
- https://github.com/rsyslog/libfastjson/issues/161
- https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html
- https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
- https://security.gentoo.org/glsa/202006-13
- https://security.netapp.com/advisory/ntap-20210521-0001/
- https://usn.ubuntu.com/4360-1/
- https://usn.ubuntu.com/4360-4/
- https://www.debian.org/security/2020/dsa-4741
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://github.com/json-c/json-c/pull/592
- https://github.com/rsyslog/libfastjson/issues/161
- https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html
- https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
- https://security.gentoo.org/glsa/202006-13
- https://security.netapp.com/advisory/ntap-20210521-0001/
- https://usn.ubuntu.com/4360-1/
- https://usn.ubuntu.com/4360-4/
- https://www.debian.org/security/2020/dsa-4741