CVE-2013-6401
21.03.2014, 01:04
Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.Enginsight
Vendor | Product | Version |
---|---|---|
jansson_project | jansson | 𝑥 ≤ 2.4 |
jansson_project | jansson | 2.0 |
jansson_project | jansson | 2.0.1 |
jansson_project | jansson | 2.1 |
jansson_project | jansson | 2.2 |
jansson_project | jansson | 2.2.1 |
jansson_project | jansson | 2.3 |
jansson_project | jansson | 2.3.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References