Cryptographic issues in jansson - CVE-2013-6401
Published: March 21, 2014 / Updated: July 28, 2020
jansson
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.