Bug 1332200 (CVE-2016-4425) - CVE-2016-4425 jansson: stack exhaustion parsing a JSON file
Summary: CVE-2016-4425 jansson: stack exhaustion parsing a JSON file
Status: CLOSED WONTFIX
Alias: CVE-2016-4425
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20160501,repor...
Keywords: Security
Depends On: 1332201 1332202
Blocks: 1332205
TreeView+ depends on / blocked
 
Reported: 2016-05-02 13:30 UTC by Andrej Nemec
Modified: 2019-06-08 21:10 UTC (History)
6 users (show)

(edit)
Clone Of:
(edit)
Last Closed: 2016-05-12 06:16:51 UTC


Attachments (Terms of Use)
reproduction script + client program (88.83 KB, application/x-gzip)
2016-05-12 06:10 UTC, Doran Moppert
no flags Details

Description Andrej Nemec 2016-05-02 13:30:18 UTC
A vulnerability was found in jansson. Parsing a maliciously crafted JSON file could cause the application to crash. This crash is caused by stack exhaustion.

CVE request:

http://seclists.org/oss-sec/2016/q2/181

Upstream bug:

https://github.com/akheron/jansson/issues/282

Upstream patch:

https://github.com/akheron/jansson/pull/284

Comment 1 Andrej Nemec 2016-05-02 13:33:36 UTC
Created jansson tracking bugs for this issue:

Affects: fedora-all [bug 1332201]
Affects: epel-6 [bug 1332202]

Comment 2 Andrej Nemec 2016-05-03 14:11:16 UTC
Upstream fix:

https://github.com/akheron/jansson/pull/284

Comment 3 Doran Moppert 2016-05-12 06:10 UTC
Created attachment 1156436 [details]
reproduction script + client program

Added repro derived from upstream bug.

Comment 4 Doran Moppert 2016-05-12 06:16:51 UTC
RHEL-7 package version 2.4/6el7 confirmed vulnerable by inspecting the source and reproducing the segfault.

The effect is stack overrun: while it segfaults there's no opportunity to exploit it for C/I compromise.  Moderate impact due to affecting availability.

Patch is easy to apply but impact is very low - closing with WONTFIX.


Note You need to log in before you can comment on or make changes to this bug.