First published: Sat May 09 2020(Updated: )
json-c could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow and out-of-bounds write. By persuading a victim to run a specially crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Json-c Json-c | <0.15-20200726 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 | |
Siemens Sinec Ins | ||
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 | |
redhat/json-c-0.14 | <3. | 3. |
redhat/libfastjson | <0.99.9.1 | 0.99.9.1 |
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 | |
ubuntu/json-c | <0.12.1-1.3ubuntu0.3 | 0.12.1-1.3ubuntu0.3 |
ubuntu/json-c | <0.13.1+dfsg-4ubuntu0.3 | 0.13.1+dfsg-4ubuntu0.3 |
ubuntu/json-c | <0.13.1+dfsg-7ubuntu0.3 | 0.13.1+dfsg-7ubuntu0.3 |
ubuntu/json-c | <0.11-3ubuntu1.2+ | 0.11-3ubuntu1.2+ |
ubuntu/json-c | <0.11-4ubuntu2.6 | 0.11-4ubuntu2.6 |
debian/json-c | 0.15-2+deb11u1 0.16-2 0.17-1 | |
debian/libfastjson | <=0.99.9-1 | 1.2304.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-12762.
The severity of CVE-2020-12762 is high.
This vulnerability affects IBM QRadar SIEM versions 7.5.0 GA, 7.4.3 GA - 7.4.3 FP4, and 7.3.3 GA - 7.3.3 FP10.
To fix CVE-2020-12762, you can apply the patches provided by IBM for affected versions of IBM QRadar SIEM.
You can find more information about CVE-2020-12762 on the following websites: [IBM X-Force Exchange](https://exchange.xforce.ibmcloud.com/vulnerabilities/182094), [IBM Support](https://www.ibm.com/support/pages/node/6574787), [Siemens ProductCERT](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf).