Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.
The product does not properly control the allocation and maintenance of a limited resource.
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Link | Tags |
---|---|
https://github.com/jettison-json/jettison/issues/45 | issue tracking third party advisory |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46549 | issue tracking permissions required third party advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html | mailing list third party advisory |
https://www.debian.org/security/2023/dsa-5312 | vendor advisory third party advisory |