CVE-2021-45958

UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ultrajson_project:ultrajson:*:*:*:*:*:python:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

History

07 Nov 2023, 03:39

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/', 'name': 'FEDORA-2022-dbf6e00ba8', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/', 'name': 'FEDORA-2022-569b6b45e2', 'tags': ['Mailing List', 'Patch', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/', 'name': 'FEDORA-2022-33e816bc37', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/', 'name': 'FEDORA-2022-d1452fd421', 'tags': ['Mailing List', 'Patch', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/ -

10 Sep 2022, 02:38

Type Values Removed Values Added
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/ - Mailing List, Patch, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/ - Mailing List, Patch, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/ - Mailing List, Third Party Advisory
CPE cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

03 Aug 2022, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/ -

07 May 2022, 08:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/ -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/ -

19 Apr 2022, 03:42

Type Values Removed Values Added
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/ - Mailing List, Third Party Advisory
First Time Fedoraproject fedora
Fedoraproject
CPE cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

26 Mar 2022, 18:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/ -

16 Mar 2022, 17:25

Type Values Removed Values Added
References (MISC) https://github.com/ultrajson/ultrajson/issues/501 - (MISC) https://github.com/ultrajson/ultrajson/issues/501 - Exploit, Issue Tracking, Third Party Advisory
References (MISC) https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284 - (MISC) https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284 - Issue Tracking, Patch, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html - Mailing List, Third Party Advisory
References (CONFIRM) https://github.com/ultrajson/ultrajson/pull/504 - (CONFIRM) https://github.com/ultrajson/ultrajson/pull/504 - Patch, Third Party Advisory
First Time Debian
Debian debian Linux
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

27 Feb 2022, 00:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html -

14 Feb 2022, 12:15

Type Values Removed Values Added
References
  • (CONFIRM) https://github.com/ultrajson/ultrajson/pull/504 -

07 Feb 2022, 22:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/ultrajson/ultrajson/issues/501 -
  • (MISC) https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284 -
Summary ** DISPUTED ** UltraJSON (aka ujson) 4.0.2 through 5.0.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). NOTE: multiple third parties dispute whether this is a confirmed finding, because the event that caused the Reproducer Testcase to stop indicating a buffer overflow was a change to the AFLplusplus project (5525f8c9ef8bb879dadd0eb942d524827d1b0362), not a change to the UltraJSON project. UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation.

07 Feb 2022, 02:15

Type Values Removed Values Added
Summary UltraJSON (aka ujson) 4.0.2 through 5.0.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). ** DISPUTED ** UltraJSON (aka ujson) 4.0.2 through 5.0.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). NOTE: multiple third parties dispute whether this is a confirmed finding, because the event that caused the Reproducer Testcase to stop indicating a buffer overflow was a change to the AFLplusplus project (5525f8c9ef8bb879dadd0eb942d524827d1b0362), not a change to the UltraJSON project.

11 Jan 2022, 18:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 5.5
References (MISC) https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml - (MISC) https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml - Exploit, Third Party Advisory
References (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009 - (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009 - Exploit, Issue Tracking, Third Party Advisory
CWE CWE-787
CPE cpe:2.3:a:ultrajson_project:ultrajson:*:*:*:*:*:python:*:*
First Time Ultrajson Project ultrajson
Ultrajson Project

01 Jan 2022, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-01 00:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-45958

Mitre link : CVE-2021-45958

CVE.ORG link : CVE-2021-45958


JSON object : View

Products Affected

fedoraproject

  • fedora

ultrajson_project

  • ultrajson

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write