|
Message-Id: <20150616094450.27DCF13A80E@smtpvmsrv1.mitre.org> Date: Tue, 16 Jun 2015 05:44:50 -0400 (EDT) From: cve-assign@...re.org To: gcanalesb@...com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE ID Request: Buffer overflow in ArduinoJson when parsing crafted JSON strings -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > https://github.com/bblanchon/ArduinoJson/commit/5e7b9ec688d79e7b16ec7064e1d37e8481a31e72 > > https://github.com/bblanchon/ArduinoJson/blob/master/CHANGELOG.md > > https://github.com/bblanchon/ArduinoJson/pull/81 > v4.5 > > Fixed buffer overflow when input contains a backslash followed by a terminator (issue #81) > Upgrading is recommended since previous versions contain a potential security risk. > the pointer will move one more step to > > "\\[\]!" > > the unescapeChar function will once again move the pointer to: > > "\\\[!]" > > And, finally, at the beginning of the next cycle > > "\\\![]" Use CVE-2015-4590 for this issue involving improper handling of quoting at the end of a string. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVf++wAAoJEKllVAevmvms0gkH/2cT6uzjei/W8O9l9QpTgO5y i592tD/BqfbNkjW9koCm6gV+ptV9fk+QeNWibsnInJZx/9kylIote6C5rpYh9xwL OOkwsoZt19S4BG+4wWI4VzP4KjzJ5VlG2U2RU1ymPnd9edQmI+2NeEkF0KuJz9qs u3fJgM6G0HGBX/yY0By5Lvp+9I0ypch/e9PyGh2JlgiIXHJPvr2AeOX3e7vD7pKM 2vXZlTv3UThnPmedwjuRHiO0v/w6jHER5nxT/iJpa1mE08xzyejUJajJF1yz1Xjj YcBgfB6VSeTBkM+NYF22GPh248pDIPz2sEvq2OPHkrNJZz1S4kbTK2mjdOSPTTM= =OYDd -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.