CVE-2013-6401
21.03.2014, 01:04
Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.Enginsight
| Vendor | Product | Version |
|---|---|---|
| jansson_project | jansson | 𝑥 ≤ 2.4 |
| jansson_project | jansson | 2.0 |
| jansson_project | jansson | 2.0.1 |
| jansson_project | jansson | 2.1 |
| jansson_project | jansson | 2.2 |
| jansson_project | jansson | 2.2.1 |
| jansson_project | jansson | 2.3 |
| jansson_project | jansson | 2.3.1 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References