ID |
CVE-2013-6371
|
Summary |
The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:json-c:json-c:-:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:-:*:*:*:*:*:*:*
-
cpe:2.3:a:json-c:json-c:0.1:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:0.1:*:*:*:*:*:*:*
-
cpe:2.3:a:json-c:json-c:0.2:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:0.2:*:*:*:*:*:*:*
-
cpe:2.3:a:json-c:json-c:0.3:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:0.3:*:*:*:*:*:*:*
-
cpe:2.3:a:json-c:json-c:0.4:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:0.4:*:*:*:*:*:*:*
-
cpe:2.3:a:json-c:json-c:0.5:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:0.5:*:*:*:*:*:*:*
-
cpe:2.3:a:json-c:json-c:0.6:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:0.6:*:*:*:*:*:*:*
-
cpe:2.3:a:json-c:json-c:0.7:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:0.7:*:*:*:*:*:*:*
-
cpe:2.3:a:json-c:json-c:0.8:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:0.8:*:*:*:*:*:*:*
-
cpe:2.3:a:json-c:json-c:0.9:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:0.9:*:*:*:*:*:*:*
-
cpe:2.3:a:json-c:json-c:0.10-20120530:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:0.10-20120530:*:*:*:*:*:*:*
-
cpe:2.3:a:json-c:json-c:0.11-20130402:*:*:*:*:*:*:*
cpe:2.3:a:json-c:json-c:0.11-20130402:*:*:*:*:*:*:*
-
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 25-09-2023 - 02:30) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-310 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
redhat
via4
|
advisories | bugzilla | id | 1032322 | title | CVE-2013-6370 json-c: buffer overflow if size_t is larger than int |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 7 is installed | oval | oval:com.redhat.rhba:tst:20150364027 |
OR | AND | comment | json-c is earlier than 0:0.11-4.el7_0 | oval | oval:com.redhat.rhsa:tst:20140703001 |
comment | json-c is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20140703002 |
|
AND | comment | json-c-devel is earlier than 0:0.11-4.el7_0 | oval | oval:com.redhat.rhsa:tst:20140703003 |
comment | json-c-devel is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20140703004 |
|
AND | comment | json-c-doc is earlier than 0:0.11-4.el7_0 | oval | oval:com.redhat.rhsa:tst:20140703005 |
comment | json-c-doc is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20140703006 |
|
|
|
|
| rhsa | id | RHSA-2014:0703 | released | 2014-06-10 | severity | Moderate | title | RHSA-2014:0703: json-c security update (Moderate) |
|
| rpms | - json-c-0:0.11-4.el7_0
- json-c-debuginfo-0:0.11-4.el7_0
- json-c-devel-0:0.11-4.el7_0
- json-c-doc-0:0.11-4.el7_0
|
|
refmap
via4
|
bid | 66715 | confirm | | fedora | FEDORA-2014-5006 | mandriva | MDVSA-2014:079 | secunia | 57791 | xf | jsonc-cve20136371-dos(92541) |
|
Last major update |
25-09-2023 - 02:30 |
Published |
22-04-2014 - 13:06 |
Last modified |
25-09-2023 - 02:30 |