5
CVSSv2

CVE-2013-6371

Published: 22/04/2014 Updated: 25/09/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The hash functionality in json-c prior to 0.12 allows context-dependent malicious users to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

json-c json-c

fedoraproject fedora 20

Vendor Advisories

Debian Bug report logs - #744008 json-c: CVE-2013-6370 CVE-2013-6371 Package: src:json-c; Maintainer for src:json-c is Debian QA Group <packages@qadebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 9 Apr 2014 06:51:02 UTC Severity: important Tags: fixed-upstream, security, upstream Fixed ...
json-c could be made to crash or consume CPU if it processed a specially crafted JSON document ...
The hash functionality in json-c before 012 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions Buffer overflow in the printbuf APIs in json-c before 012 allows remote attackers to cause a denial of service via unspecified vectors ...
The hash functionality in json-c before 012 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions ...