Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2020-12762
json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.002
EPSS Ranking
39.1%
CVSS Severity
CVSS v3 Score
7.8
CVSS v2 Score
6.8
References
https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
https://github.com/json-c/json-c/pull/592
https://github.com/rsyslog/libfastjson/issues/161
https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
https://security.gentoo.org/glsa/202006-13
https://security.netapp.com/advisory/ntap-20210521-0001/
https://usn.ubuntu.com/4360-1/
https://usn.ubuntu.com/4360-4/
https://www.debian.org/security/2020/dsa-4741
https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
https://github.com/json-c/json-c/pull/592
https://github.com/rsyslog/libfastjson/issues/161
https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
https://security.gentoo.org/glsa/202006-13
https://security.netapp.com/advisory/ntap-20210521-0001/
https://usn.ubuntu.com/4360-1/
https://usn.ubuntu.com/4360-4/
https://www.debian.org/security/2020/dsa-4741
Products affected by CVE-2020-12762
Json-C
»
Json-C
»
Version:
N/A
cpe:2.3:a:json-c:json-c:-
Json-C
»
Json-C
»
Version:
0.1
cpe:2.3:a:json-c:json-c:0.1
Json-C
»
Json-C
»
Version:
0.10-20120530
cpe:2.3:a:json-c:json-c:0.10-20120530
Json-C
»
Json-C
»
Version:
0.11-20130402
cpe:2.3:a:json-c:json-c:0.11-20130402
Json-C
»
Json-C
»
Version:
0.12-20140410
cpe:2.3:a:json-c:json-c:0.12-20140410
Json-C
»
Json-C
»
Version:
0.12.1-20160607
cpe:2.3:a:json-c:json-c:0.12.1-20160607
Json-C
»
Json-C
»
Version:
0.13-20171207
cpe:2.3:a:json-c:json-c:0.13-20171207
Json-C
»
Json-C
»
Version:
0.13.1-20180305
cpe:2.3:a:json-c:json-c:0.13.1-20180305
Json-C
»
Json-C
»
Version:
0.14-20200419
cpe:2.3:a:json-c:json-c:0.14-20200419
Json-C
»
Json-C
»
Version:
0.2
cpe:2.3:a:json-c:json-c:0.2
Json-C
»
Json-C
»
Version:
0.3
cpe:2.3:a:json-c:json-c:0.3
Json-C
»
Json-C
»
Version:
0.4
cpe:2.3:a:json-c:json-c:0.4
Json-C
»
Json-C
»
Version:
0.5
cpe:2.3:a:json-c:json-c:0.5
Json-C
»
Json-C
»
Version:
0.6
cpe:2.3:a:json-c:json-c:0.6
Json-C
»
Json-C
»
Version:
0.7
cpe:2.3:a:json-c:json-c:0.7
Json-C
»
Json-C
»
Version:
0.8
cpe:2.3:a:json-c:json-c:0.8
Json-C
»
Json-C
»
Version:
0.9
cpe:2.3:a:json-c:json-c:0.9
Siemens
»
Sinec Ins
»
Version:
N/A
cpe:2.3:a:siemens:sinec_ins:-
Siemens
»
Sinec Ins
»
Version:
1.0
cpe:2.3:a:siemens:sinec_ins:1.0
Canonical
»
Ubuntu Linux
»
Version:
12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04
Canonical
»
Ubuntu Linux
»
Version:
14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04
Canonical
»
Ubuntu Linux
»
Version:
16.04
cpe:2.3:o:canonical:ubuntu_linux:16.04
Canonical
»
Ubuntu Linux
»
Version:
18.04
cpe:2.3:o:canonical:ubuntu_linux:18.04
Canonical
»
Ubuntu Linux
»
Version:
19.10
cpe:2.3:o:canonical:ubuntu_linux:19.10
Canonical
»
Ubuntu Linux
»
Version:
20.04
cpe:2.3:o:canonical:ubuntu_linux:20.04
Debian
»
Debian Linux
»
Version:
10.0
cpe:2.3:o:debian:debian_linux:10.0
Debian
»
Debian Linux
»
Version:
8.0
cpe:2.3:o:debian:debian_linux:8.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Fedoraproject
»
Fedora
»
Version:
30
cpe:2.3:o:fedoraproject:fedora:30
Fedoraproject
»
Fedora
»
Version:
31
cpe:2.3:o:fedoraproject:fedora:31
Fedoraproject
»
Fedora
»
Version:
32
cpe:2.3:o:fedoraproject:fedora:32
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved