First published: Fri Sep 16 2022(Updated: )
jettison-json Jettison is vulnerable to a denial of service, caused by an out of memory flaw. By sending a specially-crafted XML or JSON data, a remote authenticated attacker could exploit this vulnerability to causes the parser to crash, and results in a denial of service condition.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Secure Proxy | <=6.0.3 | |
IBM Sterling Secure Proxy | <=6.1.0 | |
Jettison Project Jettison | <=1.4.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
redhat/jenkins | <2-plugins-0:4.11.1686831822-1.el8 | 2-plugins-0:4.11.1686831822-1.el8 |
redhat/jenkins | <2-plugins-0:4.12.1686649756-1.el8 | 2-plugins-0:4.12.1686649756-1.el8 |
redhat/eap7-jettison | <0:1.5.2-1.redhat_00002.1.el8ea | 0:1.5.2-1.redhat_00002.1.el8ea |
redhat/eap7-jettison | <0:1.5.2-1.redhat_00002.1.el9ea | 0:1.5.2-1.redhat_00002.1.el9ea |
redhat/eap7-jettison | <0:1.5.2-1.redhat_00002.1.el7ea | 0:1.5.2-1.redhat_00002.1.el7ea |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el7 | 0:18.0.6-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el8 | 0:18.0.6-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el9 | 0:18.0.6-1.redhat_00001.1.el9 |
debian/libjettison-java | <=1.4.0-1 | 1.5.3-1~deb10u1 1.5.3-1~deb11u1 1.5.3-1 1.5.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-40150 is a vulnerability found in Jettison, where parsing untrusted XML or JSON data may lead to a crash, causing memory exhaustion and potentially supporting a denial of service attack.
CVE-2022-40150 affects Jettison by allowing an attacker to supply content in untrusted XML or JSON data that can crash the parser and exhaust memory, leading to a denial of service.
The severity of CVE-2022-40150 is high, with a severity value of 7.
CVE-2022-40150 affects jettison-json version 2-plugins-0:4.11.1686831822-1.el8 up to version 2-plugins-0:4.12.1686649756-1.el8. It also affects various versions of eap7-jettison, rh-sso7-keycloak, Jettison, libjettison-java, and IBM Sterling External Authentication Server.
To fix CVE-2022-40150, it is recommended to update to the latest versions of the affected software or apply the patches provided by the vendors.