Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.
References
Link Resource
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46549 Issue Tracking Permissions Required Third Party Advisory
https://github.com/jettison-json/jettison/issues/45 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html Mailing List Third Party Advisory
https://www.debian.org/security/2023/dsa-5312 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: Google

Published: 2022-09-16T00:00:00

Updated: 2023-01-11T00:00:00

Reserved: 2022-09-07T00:00:00


Link: CVE-2022-40150

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-09-16T10:15:09.750

Modified: 2023-07-13T17:24:33.430


Link: CVE-2022-40150

JSON object: View

cve-icon Redhat Information

No data.