First published: Mon Sep 26 2016(Updated: )
The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex character in a JSON string, which triggers a heap-based buffer overflow.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
es iperf3 | >=3.0<3.0.12 | |
es iperf3 | >=3.1<3.1.3 | |
SUSE Package Hub for SUSE Linux Enterprise | =12 | |
openSUSE | =42.1 | |
openSUSE | =13.2 | |
Debian GNU/Linux | =8.0 | |
iperf3 project iperf3 | >=3.0<3.0.12 | |
iperf3 project iperf3 | >=3.1<3.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4303 has a high severity rating due to its potential to cause denial of service and execute arbitrary code.
To resolve CVE-2016-4303, update the cJSON library to a version that has patched the buffer overflow issue.
CVE-2016-4303 affects versions of iperf3 prior to 3.0.12 and from 3.1 to 3.1.3, along with SUSE Linux Enterprise Package Hub and older openSUSE versions.
CVE-2016-4303 is a heap-based buffer overflow vulnerability caused by improper handling of UTF8/16 strings.
Yes, CVE-2016-4303 can be exploited remotely by attackers sending malicious JSON strings.