Логотип exploitDog
bind:CVE-2022-24795
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-24795

Количество 13

Количество 13

ubuntu логотип

CVE-2022-24795

больше 3 лет назад

yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution is unlikely. A patch is available...

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2022-24795

больше 3 лет назад

yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution is unlikely. A patch is available...

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2022-24795

больше 3 лет назад

yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution is unlikely. A patch is available an

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2022-24795

больше 3 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-24795

больше 3 лет назад

yajl-ruby is a C binding to the YAJL JSON parsing and generation libra ...

CVSS3: 5.9
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3162-1

почти 3 года назад

Security update for libyajl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1746-1

около 3 лет назад

Security update for libyajl

EPSS: Низкий
rocky логотип

RLSA-2022:8252

больше 2 лет назад

Moderate: yajl security update

EPSS: Низкий
rocky логотип

RLSA-2022:7524

почти 3 года назад

Moderate: yajl security update

EPSS: Низкий
github логотип

GHSA-jj47-x69x-mxrm

больше 3 лет назад

Buffer Overflow in yajl-ruby

CVSS3: 5.9
EPSS: Низкий
oracle-oval логотип

ELSA-2022-8252

больше 2 лет назад

ELSA-2022-8252: yajl security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-7524

больше 2 лет назад

ELSA-2022-7524: yajl security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2023-07630

больше 3 лет назад

Уязвимость компонента yajl_buf.c библиотеки JSON YAJL-ruby, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-24795

yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution is unlikely. A patch is available...

CVSS3: 5.9
1%
Низкий
больше 3 лет назад
redhat логотип
CVE-2022-24795

yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution is unlikely. A patch is available...

CVSS3: 5.9
1%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-24795

yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution is unlikely. A patch is available an

CVSS3: 5.9
1%
Низкий
больше 3 лет назад
msrc логотип
CVSS3: 7.5
1%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-24795

yajl-ruby is a C binding to the YAJL JSON parsing and generation libra ...

CVSS3: 5.9
1%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3162-1

Security update for libyajl

1%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:1746-1

Security update for libyajl

1%
Низкий
около 3 лет назад
rocky логотип
RLSA-2022:8252

Moderate: yajl security update

1%
Низкий
больше 2 лет назад
rocky логотип
RLSA-2022:7524

Moderate: yajl security update

1%
Низкий
почти 3 года назад
github логотип
GHSA-jj47-x69x-mxrm

Buffer Overflow in yajl-ruby

CVSS3: 5.9
1%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2022-8252

ELSA-2022-8252: yajl security update (MODERATE)

больше 2 лет назад
oracle-oval логотип
ELSA-2022-7524

ELSA-2022-7524: yajl security update (MODERATE)

больше 2 лет назад
fstec логотип
BDU:2023-07630

Уязвимость компонента yajl_buf.c библиотеки JSON YAJL-ruby, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 7.5
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу