Bug 2135771 (CVE-2022-40149) - CVE-2022-40149 jettison: parser crash by stackoverflow
Summary: CVE-2022-40149 jettison: parser crash by stackoverflow
Keywords:
Status: NEW
Alias: CVE-2022-40149
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2128698
TreeView+ depends on / blocked
 
Reported: 2022-10-18 11:34 UTC by TEJ RATHI
Modified: 2022-11-30 15:24 UTC (History)
96 users (show)

Fixed In Version: Jettison 1.5.1
Doc Type: If docs needed, set a value
Doc Text:
A stack-based buffer overflow vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. This flaw allows an attacker to supply content that causes the parser to crash by writing outside the memory bounds if the parser is running on user-supplied input, resulting in a denial of service attack.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description TEJ RATHI 2022-10-18 11:34:41 UTC
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538
https://github.com/jettison-json/jettison/issues/45


Note You need to log in before you can comment on or make changes to this bug.