Description
In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1167-1 | ruby-yajl security update |
Debian DLA |
DLA-3492-1 | yajl security update |
Debian DLA |
DLA-3516-1 | burp security update |
EUVD |
EUVD-2017-0355 | In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service. |
Github GHSA |
GHSA-wwh7-4jw9-33x6 | yajl-ruby gem Denial of Service vulnerability |
Ubuntu USN |
USN-6233-1 | YAJL vulnerabilities |
Ubuntu USN |
USN-6233-2 | YAJL vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:27:04.174Z
Reserved: 2017-11-03T00:00:00.000Z
Link: CVE-2017-16516
No data.
Status : Modified
Published: 2017-11-03T15:29:00.233
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-16516
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN