CVE-2024-57699

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-57699
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-57699.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-57699
Aliases
Related
Published
2025-02-05T22:15:33Z
Modified
2025-03-04T07:48:29.471564Z
Downstream
Summary
[none]
Details

A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of ’{’, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370.

References

Affected packages

Debian:13 / json-smart

Package

Name
json-smart
Purl
pkg:deb/debian/json-smart?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.2-1

Affected versions

2.*

2.2-2
2.2-3
2.5.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}