Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 16 Jun 2015 05:44:50 -0400 (EDT)
From: cve-assign@...re.org
To: gcanalesb@...com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE ID Request: Buffer overflow in ArduinoJson when parsing crafted JSON strings

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://github.com/bblanchon/ArduinoJson/commit/5e7b9ec688d79e7b16ec7064e1d37e8481a31e72
> 
> https://github.com/bblanchon/ArduinoJson/blob/master/CHANGELOG.md
> 
> https://github.com/bblanchon/ArduinoJson/pull/81

> v4.5
> 
> Fixed buffer overflow when input contains a backslash followed by a terminator (issue #81)
> Upgrading is recommended since previous versions contain a potential security risk.

> the pointer will move one more step to
> 
> "\\[\]!"
> 
> the unescapeChar function will once again move the pointer to:
> 
> "\\\[!]"
> 
> And, finally, at the beginning of the next cycle
> 
> "\\\![]"

Use CVE-2015-4590 for this issue involving improper handling of quoting at the
end of a string.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVf++wAAoJEKllVAevmvms0gkH/2cT6uzjei/W8O9l9QpTgO5y
i592tD/BqfbNkjW9koCm6gV+ptV9fk+QeNWibsnInJZx/9kylIote6C5rpYh9xwL
OOkwsoZt19S4BG+4wWI4VzP4KjzJ5VlG2U2RU1ymPnd9edQmI+2NeEkF0KuJz9qs
u3fJgM6G0HGBX/yY0By5Lvp+9I0ypch/e9PyGh2JlgiIXHJPvr2AeOX3e7vD7pKM
2vXZlTv3UThnPmedwjuRHiO0v/w6jHER5nxT/iJpa1mE08xzyejUJajJF1yz1Xjj
YcBgfB6VSeTBkM+NYF22GPh248pDIPz2sEvq2OPHkrNJZz1S4kbTK2mjdOSPTTM=
=OYDd
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ