Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2022-42003
PUBLISHED
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-02 Oct, 2022 | 00:00
Updated At-03 Aug, 2024 | 12:56
Rejected At-
▼CVE Numbering Authority (CNA)

In FasterXML jackson-databind before versions 2.13.4.1 and 2.12.17.1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/FasterXML/jackson-databind/issues/3590
N/A
https://github.com/FasterXML/jackson-databind/commit/d78d00ee7b5245b93103fef3187f70543d67ca33
N/A
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51020
N/A
https://security.gentoo.org/glsa/202210-21
vendor-advisory
https://www.debian.org/security/2022/dsa-5283
vendor-advisory
https://security.netapp.com/advisory/ntap-20221124-0004/
N/A
https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html
mailing-list
Hyperlink: https://github.com/FasterXML/jackson-databind/issues/3590
Resource: N/A
Hyperlink: https://github.com/FasterXML/jackson-databind/commit/d78d00ee7b5245b93103fef3187f70543d67ca33
Resource: N/A
Hyperlink: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51020
Resource: N/A
Hyperlink: https://security.gentoo.org/glsa/202210-21
Resource:
vendor-advisory
Hyperlink: https://www.debian.org/security/2022/dsa-5283
Resource:
vendor-advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20221124-0004/
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html
Resource:
mailing-list
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/FasterXML/jackson-databind/issues/3590
x_transferred
https://github.com/FasterXML/jackson-databind/commit/d78d00ee7b5245b93103fef3187f70543d67ca33
x_transferred
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51020
x_transferred
https://security.gentoo.org/glsa/202210-21
vendor-advisory
x_transferred
https://www.debian.org/security/2022/dsa-5283
vendor-advisory
x_transferred
https://security.netapp.com/advisory/ntap-20221124-0004/
x_transferred
https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html
mailing-list
x_transferred
Hyperlink: https://github.com/FasterXML/jackson-databind/issues/3590
Resource:
x_transferred
Hyperlink: https://github.com/FasterXML/jackson-databind/commit/d78d00ee7b5245b93103fef3187f70543d67ca33
Resource:
x_transferred
Hyperlink: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51020
Resource:
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202210-21
Resource:
vendor-advisory
x_transferred
Hyperlink: https://www.debian.org/security/2022/dsa-5283
Resource:
vendor-advisory
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20221124-0004/
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html
Resource:
mailing-list
x_transferred
Details not found