Vulnerability Description
The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex character in a JSON string, which triggers a heap-based buffer overflow.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Es | Iperf3 | >= 3.0, < 3.0.12 |
| Novell | Suse Package Hub For Suse Linux Enterprise | 12 |
| Opensuse | Leap | 42.1 |
| Opensuse | Opensuse | 13.2 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://blog.talosintel.com/2016/06/esnet-vulnerability.htmlExploitThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00082.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00090.htmlMailing ListThird Party Advisory
- http://software.es.net/iperf/news.html#security-issue-iperf-3-1-3-iperf-3-0-12-rRelease NotesThird Party Advisory
- http://www.talosintelligence.com/reports/TALOS-2016-0164/ExploitThird Party Advisory
- https://github.com/esnet/iperf/commit/91f2fa59e8ed80dfbf400add0164ee0e508e412aPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/01/msg00023.htmlMailing ListThird Party Advisory
- https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secaThird Party Advisory
- http://blog.talosintel.com/2016/06/esnet-vulnerability.htmlExploitThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00082.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00090.htmlMailing ListThird Party Advisory
- http://software.es.net/iperf/news.html#security-issue-iperf-3-1-3-iperf-3-0-12-rRelease NotesThird Party Advisory
- http://www.talosintelligence.com/reports/TALOS-2016-0164/ExploitThird Party Advisory
- https://github.com/esnet/iperf/commit/91f2fa59e8ed80dfbf400add0164ee0e508e412aPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/01/msg00023.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2016-4303?
CVE-2016-4303 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex charact...
How severe is CVE-2016-4303?
CVE-2016-4303 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-4303?
Check the references section above for vendor advisories and patch information. Affected products include: Es Iperf3, Novell Suse Package Hub For Suse Linux Enterprise, Opensuse Leap, Opensuse Opensuse, Debian Debian Linux.