Vulnerability Name: | CVE-2021-45958 (CCN-216472) | ||||||||||||
Assigned: | 2021-07-10 | ||||||||||||
Published: | 2021-07-10 | ||||||||||||
Updated: | 2022-09-10 | ||||||||||||
Summary: | UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-45958 Source: CCN Type: Google Security Research Issue 36009 ujson:hypothesis_structured_fuzzer: Stack-buffer-overflow in Buffer_AppendIndentUnchecked Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009 Source: XF Type: UNKNOWN ultrajson-cve202145958-dos(216472) Source: MISC Type: Exploit, Third Party Advisory https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml Source: CCN Type: ultrajson GIT Repository Strip debugging symbols from Linux binaries Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/ultrajson/ultrajson/issues/501 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284 Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/ultrajson/ultrajson/pull/504 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20220226 [SECURITY] [DLA 2929-1] ujson security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-dbf6e00ba8 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-33e816bc37 Source: FEDORA Type: Mailing List, Patch, Third Party Advisory FEDORA-2022-d1452fd421 Source: FEDORA Type: Mailing List, Patch, Third Party Advisory FEDORA-2022-569b6b45e2 Source: CCN Type: IBM Security Bulletin 6854981 (Cloud Pak for Security) IBM Cloud Pak for Security includes components with multiple known vulnerabilities Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-45958 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |