First published: Wed Nov 20 2013(Updated: )
CVE-2013-6370 Buffer overflow in the printbuf APIs in json-c before 0.12 allows remote attackers to cause a denial of service via unspecified vectors. CVE-2013-6371 The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Json-c | <0.12-20140410 | |
Fedora | =20 | |
F5 BIG-IP Next | >=1.7.0<=1.9.2 | |
F5 BIG-IP Next | >=1.1.0<=1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6371 has a medium severity due to its potential to cause excessive CPU usage.
To fix CVE-2013-6371, update the json-c library to version 0.12-20140410 or later.
CVE-2013-6371 affects json-c library versions before 0.12-20140410 and Fedora 20.
CVE-2013-6371 can lead to denial of service attacks by exploiting quadratic timing behavior in JSON parsing.
A temporary workaround for CVE-2013-6371 includes limiting the size and complexity of JSON data processed by affected applications.