Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:E16D8E988420765C16BC608B63004B3D
HistorySep 21, 2016 - 12:00 a.m.

CVE-2014-9130: LibYAML vulnerability | Cloud Foundry

2016-09-2100:00:00
Cloud Foundry
www.cloudfoundry.org
14

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.018 Low

EPSS

Percentile

88.1%

CVE-2014-9130: LibYAML vulnerability

Medium

Vendor

LibYAML

Versions Affected

  • Cloud Foundry Ruby Buildpack versions prior to 1.6.25

Description

Stanisław Pitucha and Jonathan Gray discovered that LibYAML did not properly handle wrapped strings. An attacker could create specially crafted YAML data to trigger an assert, causing a denial of service.

Mitigation

OSS users are strongly encouraged to follow one of the mitigations below:

  • Upgrade the Ruby Buildpack to v1.6.25 [1] or later and restage all applications that use automated buildpack detection

Credit

Stanisław Pitucha and Jonathan Gray

References

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.018 Low

EPSS

Percentile

88.1%