The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
http://www.securityfocus.com/bid/66715
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://secunia.com/advisories/57791
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131845.html
https://github.com/json-c/json-c/commit/64e36901a0614bf64a19bc3396469c66dcd0b015
https://exchange.xforce.ibmcloud.com/vulnerabilities/92541
https://bugzilla.redhat.com/show_bug.cgi?id=1032311
Source: Mitre, NVD
Published: 2014-04-22
Updated: 2025-04-12
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P
Severity: Medium
Base Score: 5.3
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS: 0.00422