Lucene search

K
amazonAmazonALAS-2014-321
HistoryApr 10, 2014 - 11:54 p.m.

Important: libyaml

2014-04-1023:54:00
alas.aws.amazon.com
19

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.731 High

EPSS

Percentile

98.1%

Issue Overview:

Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.

Affected Packages:

libyaml

Issue Correction:
Run yum update libyaml to update your system.

New Packages:

i686:  
    libyaml-debuginfo-0.1.6-1.6.amzn1.i686  
    libyaml-devel-0.1.6-1.6.amzn1.i686  
    libyaml-0.1.6-1.6.amzn1.i686  
  
src:  
    libyaml-0.1.6-1.6.amzn1.src  
  
x86_64:  
    libyaml-devel-0.1.6-1.6.amzn1.x86_64  
    libyaml-debuginfo-0.1.6-1.6.amzn1.x86_64  
    libyaml-0.1.6-1.6.amzn1.x86_64  

Additional References

Red Hat: CVE-2014-2525

Mitre: CVE-2014-2525

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.731 High

EPSS

Percentile

98.1%