vulnerability
Red Hat JBoss EAP: CVE-2022-40149: Stack-based Buffer Overflow
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Sep 20, 2022 | Sep 19, 2024 | Jul 9, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Sep 20, 2022
Added
Sep 19, 2024
Modified
Jul 9, 2025
Description
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.. A stack-based buffer overflow vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. This flaw allows an attacker to supply content that causes the parser to crash by writing outside the memory bounds if the parser is running on user-supplied input, resulting in a denial of service attack.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-121
- CWE-787
- CVE-2022-40149
- https://attackerkb.com/topics/CVE-2022-40149
- URL-https://access.redhat.com/security/cve/CVE-2022-40149
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2135771
- URL-https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1
- URL-https://access.redhat.com/errata/RHSA-2023:0552
- URL-https://access.redhat.com/errata/RHSA-2023:0553
- URL-https://access.redhat.com/errata/RHSA-2023:0554
- URL-https://access.redhat.com/errata/RHSA-2023:0556
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.