Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published: 2014-03-20T18:00:00
Updated: 2024-08-06T17:39:01.595Z
Reserved: 2013-11-04T00:00:00
Link: CVE-2013-6401

No data.

Status : Modified
Published: 2014-03-21T01:04:00.623
Modified: 2024-11-21T01:59:09.293
Link: CVE-2013-6401
