json-c 输入验证错误漏洞
CNNVD-ID编号 | CNNVD-202005-391 | CVE编号 | CVE-2020-12762 |
发布时间 | 2020-05-09 | 更新时间 | 2020-12-21 |
漏洞类型 | 输入验证错误 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 本地 |
厂商 | N/A |
漏洞介绍
json-c是一款基于C语言的JSON解析器。
json-c 0.14及之前版本中存在输入验证错误漏洞。远程攻击者可借助较大的JSON文件利用该漏洞在系统上执行任意代码。
漏洞补丁
目前厂商已发布升级了json-c 输入验证错误漏洞的补丁,json-c 输入验证错误漏洞的补丁获取链接:
https://github.com/json-c/json-c/pull/592/commits/d07b91014986900a3a75f306d302e13e005e9d67
参考网址
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html
来源:FEDORA
来源:MISC
链接:https://github.com/rsyslog/libfastjson/issues/161
来源:FEDORA
来源:UBUNTU
链接:https://usn.ubuntu.com/4360-4/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html
来源:GENTOO
链接:https://security.gentoo.org/glsa/202006-13
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4741
来源:UBUNTU
链接:https://usn.ubuntu.com/4360-1/
来源:FEDORA
来源:CONFIRM
链接:https://github.com/json-c/json-c/pull/592
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/json-c-memory-corruption-32277
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2678/
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157714/Ubuntu-Security-Notice-USN-4360-1.html
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/47604
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1724.3/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2608/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1724/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1899/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158084/Gentoo-Linux-Security-Advisory-202006-13.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-12762
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202005-391

评论