Heap-based buffer overflow - CVE-2015-8863
Published: May 6, 2016 / Updated: August 3, 2020
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Off-by-one error in the tokenadd function in jv_parse.c in jq. A remote attacker can use a long JSON-encoded number to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2015-8863
Sources
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2016-1098.html
- http://rhn.redhat.com/errata/RHSA-2016-1099.html
- http://rhn.redhat.com/errata/RHSA-2016-1106.html
- http://www.openwall.com/lists/oss-security/2016/04/23/1
- http://www.openwall.com/lists/oss-security/2016/04/23/2
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802231
- https://github.com/stedolan/jq/commit/8eb1367ca44e772963e704a700ef72ae2e12babd
- https://github.com/stedolan/jq/issues/995
- https://security.gentoo.org/glsa/201612-20