Lucene search

K
gentooGentoo FoundationGLSA-202408-08
HistoryAug 07, 2024 - 12:00 a.m.

json-c: Buffer Overflow

2024-08-0700:00:00
Gentoo Foundation
security.gentoo.org
1
json-c
buffer overflow
parseit
cve
stack-buffer-overflow
upgrade
dev-libs
json-c-0.16
json implementation
c
sample program

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

Low

EPSS

0.002

Percentile

52.0%

Background

json-c is a JSON implementation in C.

Description

Please review the CVE identifier referenced below for details.

Impact

A stack-buffer-overflow exists in the auxiliary sample program json_parse which is located in the function parseit.

Workaround

There is no known workaround at this time.

Resolution

All json-c users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/json-c-0.16"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-libs/json-c< 0.16UNKNOWN

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

Low

EPSS

0.002

Percentile

52.0%