CVE-2024-4420

May 21, 2024, 12:37 p.m.

Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

Products

Tink-cc

  • before 2.1.3

Source

cve-coordination@google.com

Tags

CVE-2024-4420 details

Published : May 21, 2024, 12:15 p.m.
Last Modified : May 21, 2024, 12:37 p.m.

Description

There exists a Denial of service vulnerability in Tink-cc in versions prior to 2.1.3.  * An adversary can crash binaries using the crypto::tink::JsonKeysetReader in tink-cc by providing an input that is not an encoded JSON object, but still a valid encoded JSON element, for example a number or an array. This will crash as Tink just assumes any valid JSON input will contain an object. * An adversary can crash binaries using the crypto::tink::JsonKeysetReader in tink-cc by providing an input containing many nested JSON objects. This may result in a stack overflow. We recommend upgrading to version 2.1.3 or above

CVSS Score

1 2 3 4 5 6 7 8 9 10

Weakness

Weakness Name Description

References

URL Source
https://github.com/tink-crypto/tink-cc/issues/4 cve-coordination@google.com
This website uses the NVD API, but is not approved or certified by it.