Vigil@nce - json-c: two vulnerabilities
May 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of json-c.
Impacted products: Fedora, MBS, openSUSE, RSYSLOG, Unix (platform)
Severity: 2/4
Creation date: 17/04/2014
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in json-c.
An attacker can generate a buffer overflow if the size of "size_t"
is larger than the size of "int", in order to trigger a denial of
service, and possibly to execute code. [severity:2/4;
CVE-2013-6370]
An attacker can use special JSON data, to generate collisions in a
hash function, in order to trigger a denial of service.
[severity:2/4; CVE-2013-6371]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/json-c-two-vulnerabilities-14615