-
Notifications
You must be signed in to change notification settings - Fork 3.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cJSON buffer overflow with odd formatted JSON string #30
Comments
I can confirm this. Looking into it right now. |
Fixed via 94df772 |
Merged
bmah888
added a commit
to esnet/iperf
that referenced
this issue
Oct 5, 2016
This is DaveGamble/cJSON#30, and fixes issue #466.
bmah888
added a commit
to esnet/iperf
that referenced
this issue
Oct 5, 2016
This is DaveGamble/cJSON#30, and fixes issue #466. Signed-off-by: Bruce A. Mah <bmah@es.net>
bmah888
added a commit
to esnet/iperf
that referenced
this issue
Oct 5, 2016
This is DaveGamble/cJSON#30, and fixes issue #466. Signed-off-by: Bruce A. Mah <bmah@es.net>
FSMaxB
added a commit
that referenced
this issue
May 1, 2017
5405313 Add tests for replacing the root document (#30) git-subtree-dir: tests/json-patch-tests git-subtree-split: 54053131a31241ecccfffdc79753ff169aa9763c
Floessie
added a commit
to RawTherapee/RawTherapee
that referenced
this issue
Mar 27, 2018
Should fix CVE-2016-4303 and DaveGamble/cJSON#30.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hi,
I would like to report a buffer overflow in cJSON, you can test this PoC with a ODD string
building it with ASAN will trigger a out of bound on the input string, which it can be problematic since in lot of use cases the JSON input to applications using cJSON is untrusted.
Thanks
Marco
The text was updated successfully, but these errors were encountered: