9.8
CVSSv3

CVE-2015-8863

Published: 06/05/2016 Updated: 30/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Off-by-one error in the tokenadd function in jv_parse.c in jq allows remote malicious users to cause a denial of service (crash) via a long JSON-encoded number, which triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

opensuse opensuse 13.2

opensuse leap 42.1

jq project jq

Vendor Advisories

Debian Bug report logs - #802231 jq: CVE-2015-8863: Heap buffer overflow in tokenadd() Package: jq; Maintainer for jq is ChangZhuo Chen (陳昌倬) <czchen@debianorg>; Source for jq is src:jq (PTS, buildd, popcon) Reported by: Jakub Wilk <jwilk@debianorg> Date: Sun, 18 Oct 2015 16:06:02 UTC Severity: normal Tags: ...
Debian Bug report logs - #822456 jq: CVE-2016-4074: Stack exhaustion parsing a JSON file Package: src:jq; Maintainer for src:jq is ChangZhuo Chen (陳昌倬) <czchen@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 24 Apr 2016 17:27:02 UTC Severity: normal Tags: security, upstream Found ...
A heap-based buffer overflow flaw was found in the tokenadd() function By tricking a victim into processing a specially crafted JSON file, an attacker could use this flaw to crash jq or, potentially, execute arbitrary code on the victim's system (CVE-2015-8863) ...
A heap-based buffer overflow flaw was found in jq's tokenadd() function By tricking a victim into processing a specially crafted JSON file, an attacker could use this flaw to crash jq or, potentially, execute arbitrary code on the victim's system ...