Lucene search

K
amazonAmazonALAS-2014-324
HistoryApr 17, 2014 - 2:18 p.m.

Important: perl-YAML-LibYAML

2014-04-1714:18:00
alas.aws.amazon.com
18

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.731 High

EPSS

Percentile

98.1%

Issue Overview:

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.

Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.

Affected Packages:

perl-YAML-LibYAML

Issue Correction:
Run yum update perl-YAML-LibYAML to update your system.

New Packages:

i686:  
    perl-YAML-LibYAML-debuginfo-0.41-4.9.amzn1.i686  
    perl-YAML-LibYAML-0.41-4.9.amzn1.i686  
  
src:  
    perl-YAML-LibYAML-0.41-4.9.amzn1.src  
  
x86_64:  
    perl-YAML-LibYAML-debuginfo-0.41-4.9.amzn1.x86_64  
    perl-YAML-LibYAML-0.41-4.9.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-6393, CVE-2014-2525

Mitre: CVE-2013-6393, CVE-2014-2525

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.731 High

EPSS

Percentile

98.1%