CVE-2023-1370

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-1370
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-1370.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-1370
Aliases
Related
Published
2023-03-22T06:15:09Z
Modified
2024-09-18T03:22:47.860213Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Json-smart is a performance focused, JSON processor lib.

When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively.

It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.

References

Affected packages

Debian:11 / json-smart

Package

Name
json-smart
Purl
pkg:deb/debian/json-smart?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2-2+deb11u1

Affected versions

2.*

2.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / json-smart

Package

Name
json-smart
Purl
pkg:deb/debian/json-smart?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2-2+deb12u1

Affected versions

2.*

2.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / json-smart

Package

Name
json-smart
Purl
pkg:deb/debian/json-smart?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2-3

Affected versions

2.*

2.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/netplex/json-smart-v2

Affected ranges

Type
GIT
Repo
https://github.com/netplex/json-smart-v2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*

2.2
2.4.1
2.4.5
2.4.8