CVE-2016-4303

The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex character in a JSON string, which triggers a heap-based buffer overflow.
References
Link Resource
http://blog.talosintel.com/2016/06/esnet-vulnerability.html Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-08/msg00082.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-08/msg00090.html Mailing List Third Party Advisory
http://software.es.net/iperf/news.html#security-issue-iperf-3-1-3-iperf-3-0-12-released Release Notes Third Party Advisory
http://www.talosintelligence.com/reports/TALOS-2016-0164/ Exploit Third Party Advisory
https://github.com/esnet/iperf/commit/91f2fa59e8ed80dfbf400add0164ee0e508e412a Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/01/msg00023.html Mailing List Third Party Advisory
https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secadv-2016-0001.txt.asc Third Party Advisory
http://blog.talosintel.com/2016/06/esnet-vulnerability.html Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-08/msg00082.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-08/msg00090.html Mailing List Third Party Advisory
http://software.es.net/iperf/news.html#security-issue-iperf-3-1-3-iperf-3-0-12-released Release Notes Third Party Advisory
http://www.talosintelligence.com/reports/TALOS-2016-0164/ Exploit Third Party Advisory
https://github.com/esnet/iperf/commit/91f2fa59e8ed80dfbf400add0164ee0e508e412a Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/01/msg00023.html Mailing List Third Party Advisory
https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secadv-2016-0001.txt.asc Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:es:iperf3:*:*:*:*:*:*:*:*
cpe:2.3:a:es:iperf3:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

15 Jan 2025, 19:12

Type Values Removed Values Added
First Time Es
Es iperf3
CPE cpe:2.3:a:iperf3_project:iperf3:*:*:*:*:*:*:*:* cpe:2.3:a:es:iperf3:*:*:*:*:*:*:*:*

Information

Published : 2016-09-26 14:59

Updated : 2025-04-12 10:46


NVD link : CVE-2016-4303

Mitre link : CVE-2016-4303

CVE.ORG link : CVE-2016-4303


JSON object : View

Products Affected

opensuse

  • opensuse
  • leap

debian

  • debian_linux

novell

  • suse_package_hub_for_suse_linux_enterprise

es

  • iperf3
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')