First published: Fri Sep 16 2022(Updated: )
A stack-based buffer overflow vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. This flaw allows an attacker to supply content that causes the parser to crash by writing outside the memory bounds if the parser is running on user-supplied input, resulting in a denial of service attack.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jettison Project Jettison | <=1.4.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
redhat/jenkins | <2-plugins-0:4.11.1686831822-1.el8 | 2-plugins-0:4.11.1686831822-1.el8 |
redhat/jenkins | <2-plugins-0:4.12.1686649756-1.el8 | 2-plugins-0:4.12.1686649756-1.el8 |
redhat/eap7-jettison | <0:1.5.2-1.redhat_00002.1.el8ea | 0:1.5.2-1.redhat_00002.1.el8ea |
redhat/eap7-jettison | <0:1.5.2-1.redhat_00002.1.el9ea | 0:1.5.2-1.redhat_00002.1.el9ea |
redhat/eap7-jettison | <0:1.5.2-1.redhat_00002.1.el7ea | 0:1.5.2-1.redhat_00002.1.el7ea |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el7 | 0:18.0.6-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el8 | 0:18.0.6-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el9 | 0:18.0.6-1.redhat_00001.1.el9 |
IBM Sterling Secure Proxy | <=6.0.3 | |
IBM Sterling Secure Proxy | <=6.1.0 | |
debian/libjettison-java | <=1.4.0-1 | 1.5.3-1~deb10u1 1.5.3-1~deb11u1 1.5.3-1 1.5.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
Vulnerability CVE-2022-40149 is a stack-based buffer overflow vulnerability in Jettison, which can lead to a crash when parsing untrusted XML or JSON data.
Vulnerability CVE-2022-40149 can be exploited by attackers to supply malicious content that causes the parser to crash, resulting in a denial of service.
Software versions 2-plugins-0:4.11.1686831822-1.el8 and 2-plugins-0:4.12.1686649756-1.el8 of Jenkins, as well as versions 0:1.5.2-1.redhat_00002.1.el8ea, 0:1.5.2-1.redhat_00002.1.el9ea, and 0:1.5.2-1.redhat_00002.1.el7ea of eap7-jettison are affected by vulnerability CVE-2022-40149.
Vulnerability CVE-2022-40149 has a severity rating of high, with a CVSS severity value of 7.
To mitigate vulnerability CVE-2022-40149, it is recommended to apply the provided patches or updates for the affected software versions.