7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
json-c is vulnerable to arbitrary code execution. The vulnerability exists through an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
github.com/json-c/json-c/pull/592
github.com/rsyslog/libfastjson/issues/161
lists.debian.org/debian-lts-announce/2020/05/msg00032.html
lists.debian.org/debian-lts-announce/2020/05/msg00034.html
lists.debian.org/debian-lts-announce/2020/07/msg00031.html
lists.fedoraproject.org/archives/list/[email protected]/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
lists.fedoraproject.org/archives/list/[email protected]/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
lists.fedoraproject.org/archives/list/[email protected]/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
security.gentoo.org/glsa/202006-13
security.netapp.com/advisory/ntap-20210521-0001/
usn.ubuntu.com/4360-1/
usn.ubuntu.com/4360-4/
www.debian.org/security/2020/dsa-4741
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P