In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  Debian DLA | 
                DLA-1167-1 | ruby-yajl security update | 
  Debian DLA | 
                DLA-3492-1 | yajl security update | 
  Debian DLA | 
                DLA-3516-1 | burp security update | 
  EUVD | 
                EUVD-2017-0355 | In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service. | 
  Github GHSA | 
                GHSA-wwh7-4jw9-33x6 | yajl-ruby gem Denial of Service vulnerability | 
  Ubuntu USN | 
                USN-6233-1 | YAJL vulnerabilities | 
  Ubuntu USN | 
                USN-6233-2 | YAJL vulnerabilities | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:27:04.174Z
Reserved: 2017-11-03T00:00:00
Link: CVE-2017-16516
No data.
Status : Deferred
Published: 2017-11-03T15:29:00.233
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-16516
                        OpenCVE Enrichment
                    No data.
 Debian DLA
 EUVD
 Github GHSA
 Ubuntu USN