The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
{"nessus": [{"lastseen": "2021-10-16T02:00:05", "description": "The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.", "cvss3": {"score": null, "vector": null}, "published": "2014-03-02T00:00:00", "type": "nessus", "title": "Amazon Linux AMI : libyaml (ALAS-2014-291)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2018-04-18T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:libyaml", "p-cpe:/a:amazon:linux:libyaml-debuginfo", "p-cpe:/a:amazon:linux:libyaml-devel", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2014-291.NASL", "href": "https://www.tenable.com/plugins/nessus/72747", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2014-291.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(72747);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/04/18 15:09:35\");\n\n script_cve_id(\"CVE-2013-6393\");\n script_xref(name:\"ALAS\", value:\"2014-291\");\n\n script_name(english:\"Amazon Linux AMI : libyaml (ALAS-2014-291)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before\n0.1.5 performs an incorrect cast, which allows remote attackers to\ncause a denial of service (application crash) and possibly execute\narbitrary code via crafted tags in a YAML document, which triggers a\nheap-based buffer overflow.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2014-291.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update libyaml' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:libyaml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:libyaml-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:libyaml-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/02/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/03/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"libyaml-0.1.4-6.5.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"libyaml-debuginfo-0.1.4-6.5.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"libyaml-devel-0.1.4-6.5.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libyaml / libyaml-debuginfo / libyaml-devel\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:51:14", "description": "Florian Weimer discovered that LibYAML incorrectly handled certain large yaml documents. An attacker could use this issue to cause LibYAML to crash, resulting in a denial of service, or possibly execute arbitrary code.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2014-02-05T00:00:00", "type": "nessus", "title": "Ubuntu 12.04 LTS / 12.10 / 13.10 : libyaml vulnerability (USN-2098-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libyaml-0-2", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:canonical:ubuntu_linux:13.10"], "id": "UBUNTU_USN-2098-1.NASL", "href": "https://www.tenable.com/plugins/nessus/72326", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2098-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72326);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-6393\");\n script_bugtraq_id(65258);\n script_xref(name:\"USN\", value:\"2098-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS / 12.10 / 13.10 : libyaml vulnerability (USN-2098-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Florian Weimer discovered that LibYAML incorrectly handled certain\nlarge yaml documents. An attacker could use this issue to cause\nLibYAML to crash, resulting in a denial of service, or possibly\nexecute arbitrary code.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2098-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libyaml-0-2 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libyaml-0-2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:13.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/02/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/02/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/02/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04|12\\.10|13\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04 / 12.10 / 13.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"libyaml-0-2\", pkgver:\"0.1.4-2ubuntu0.12.04.1\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"libyaml-0-2\", pkgver:\"0.1.4-2ubuntu0.12.10.1\")) flag++;\nif (ubuntu_check(osver:\"13.10\", pkgname:\"libyaml-0-2\", pkgver:\"0.1.4-2ubuntu0.13.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libyaml-0-2\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:50:50", "description": "Florian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.\n\nThis update corrects this flaw in the copy that is embedded in the libyaml-libyaml-perl package.", "cvss3": {"score": null, "vector": null}, "published": "2014-03-10T00:00:00", "type": "nessus", "title": "Debian DSA-2870-1 : libyaml-libyaml-perl - heap-based buffer overflow", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libyaml-libyaml-perl", "cpe:/o:debian:debian_linux:6.0", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DSA-2870.NASL", "href": "https://www.tenable.com/plugins/nessus/72886", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2870. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72886);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-6393\");\n script_bugtraq_id(65258);\n script_xref(name:\"DSA\", value:\"2870\");\n\n script_name(english:\"Debian DSA-2870-1 : libyaml-libyaml-perl - heap-based buffer overflow\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Florian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with\na specially crafted tag that, when parsed by an application using\nlibyaml, would cause the application to crash or, potentially, execute\narbitrary code with the privileges of the user running the\napplication.\n\nThis update corrects this flaw in the copy that is embedded in the\nlibyaml-libyaml-perl package.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/squeeze/libyaml-libyaml-perl\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/libyaml-libyaml-perl\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2014/dsa-2870\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the libyaml-libyaml-perl packages.\n\nFor the oldstable distribution (squeeze), this problem has been fixed\nin version 0.33-1+squeeze2.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.38-3+deb7u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libyaml-libyaml-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:6.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/03/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/03/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"6.0\", prefix:\"libyaml-libyaml-perl\", reference:\"0.33-1+squeeze2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libyaml-libyaml-perl\", reference:\"0.38-3+deb7u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:50:58", "description": "The remote host is affected by the vulnerability described in GLSA-201403-02 (LibYAML: Arbitrary code execution)\n\n A heap-based buffer overflow flaw was found in the way libyaml parsed YAML tags.\n Impact :\n\n A remote attacker could provide a specially crafted YAML document which when parsed by LibYAML, would cause the application to crash or, potentially, execute arbitrary code with the privileges the user who is running the application.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": null, "vector": null}, "published": "2014-03-10T00:00:00", "type": "nessus", "title": "GLSA-201403-02 : LibYAML: Arbitrary code execution", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:libyaml", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201403-02.NASL", "href": "https://www.tenable.com/plugins/nessus/72894", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201403-02.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72894);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-6393\");\n script_bugtraq_id(65258);\n script_xref(name:\"GLSA\", value:\"201403-02\");\n\n script_name(english:\"GLSA-201403-02 : LibYAML: Arbitrary code execution\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201403-02\n(LibYAML: Arbitrary code execution)\n\n A heap-based buffer overflow flaw was found in the way libyaml parsed\n YAML tags.\n \nImpact :\n\n A remote attacker could provide a specially crafted YAML document which\n when parsed by LibYAML, would cause the application to crash or,\n potentially, execute arbitrary code with the privileges the user who is\n running the application.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201403-02\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All LibYAML users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-libs/libyaml-0.1.5'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:libyaml\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/03/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/03/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"dev-libs/libyaml\", unaffected:make_list(\"ge 0.1.5\"), vulnerable:make_list(\"lt 0.1.5\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"LibYAML\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:50:54", "description": "According to its self-reported version number, the Puppet Enterprise 3.x install on the remote host is prior to 3.1.3. As a result, it is reportedly affected by an error related to the included LibYAML version, the 'yaml_parser_scan_tag_uri' function and YAML tag parsing that could allow a heap-based buffer overflow and potentially arbitrary code execution.", "cvss3": {"score": null, "vector": null}, "published": "2014-03-21T00:00:00", "type": "nessus", "title": "Puppet Enterprise 3.x < 3.1.3 LibYAML Heap-Based Buffer Overflow", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2021-01-19T00:00:00", "cpe": ["cpe:/a:puppetlabs:puppet"], "id": "PUPPET_ENTERPRISE_313.NASL", "href": "https://www.tenable.com/plugins/nessus/73134", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73134);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-6393\");\n script_bugtraq_id(65258);\n\n script_name(english:\"Puppet Enterprise 3.x < 3.1.3 LibYAML Heap-Based Buffer Overflow\");\n script_summary(english:\"Checks Puppet Enterprise version\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"A web application on the remote host is affected by a buffer overflow\nvulnerability.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"According to its self-reported version number, the Puppet Enterprise\n3.x install on the remote host is prior to 3.1.3. As a result, it is\nreportedly affected by an error related to the included LibYAML version,\nthe 'yaml_parser_scan_tag_uri' function and YAML tag parsing that could\nallow a heap-based buffer overflow and potentially arbitrary code\nexecution.\"\n );\n # https://groups.google.com/forum/#!searchin/puppet-users/3.1.3/puppet-users/fOH1r1YAho0/-g8mhpce98IJ\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd5a8021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://puppet.com/security/cve/cve-2013-6393\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Puppet Enterprise 3.1.3 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/01/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/02/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/03/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:puppetlabs:puppet\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n\n script_dependencies(\"puppet_rest_detect.nasl\");\n script_require_keys(\"puppet/rest_port\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\n##\n# checks if the given version falls between the given bounds, and\n# generates plugin output if it does\n#\n# @anonparam ver version to check\n# @anonparam fix first fixed version\n# @anonparam min_ver the lowest/earliest vulnerable version, relative to 'fix' (optional)\n#\n# @return plugin output if 'ver' is vulnerable relative to 'fix' and/or 'min_ver',\n# NULL otherwise\n##\nfunction _check_version(enterprise)\n{\n local_var ver, fix, min_ver, major_ver, report;\n ver = _FCT_ANON_ARGS[0];\n fix = _FCT_ANON_ARGS[1];\n min_ver = _FCT_ANON_ARGS[2];\n\n if (\n # no lower bound\n (isnull(min_ver) && ver_compare(ver:ver, fix:fix, strict:FALSE) < 0) ||\n\n # lower bound\n (\n !isnull(min_ver) &&\n ver_compare(ver:ver, fix:fix, strict:FALSE) < 0 &&\n ver_compare(ver:ver, fix:min_ver, strict:FALSE) >= 0\n )\n )\n {\n if (enterprise)\n {\n report =\n '\\n Installed version : Puppet Enterprise ' + ver +\n '\\n Fixed version : Puppet Enterprise ' + fix + '\\n';\n }\n else report = NULL;\n }\n else report = NULL;\n\n return report;\n}\n\nport = get_kb_item_or_exit('puppet/rest_port');\nver = get_kb_item_or_exit('puppet/' + port + '/version');\nreport = NULL;\nvuln = FALSE;\n\nif ('Enterprise' >< ver)\n{\n # convert something like\n # 2.7.19 (Puppet Enterprise 2.7.0)\n # to\n # 2.7.0\n match = eregmatch(string:ver, pattern:\"Enterprise ([0-9.]+)\\)\");\n if (isnull(match)) audit(AUDIT_UNKNOWN_WEB_APP_VER, 'Puppet Enterprise', build_url(port:port));\n ver = match[1];\n\n # Resolved in Puppet Enterprise 3.1.3\n if (report = _check_version(ver, '3.1.3', '3.0.0', enterprise:TRUE))\n {\n vuln = TRUE;\n }\n}\n\nif (!vuln) audit(AUDIT_LISTEN_NOT_VULN, 'Puppet', port, ver);\n\nif (report_verbosity > 0) security_warning(port:port, extra:report);\nelse security_warning(port);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:51:22", "description": "Florian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.", "cvss3": {"score": null, "vector": null}, "published": "2014-02-02T00:00:00", "type": "nessus", "title": "Debian DSA-2850-1 : libyaml - heap-based buffer overflow", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libyaml", "cpe:/o:debian:debian_linux:6.0", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DSA-2850.NASL", "href": "https://www.tenable.com/plugins/nessus/72240", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2850. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72240);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-6393\");\n script_bugtraq_id(65258);\n script_xref(name:\"DSA\", value:\"2850\");\n\n script_name(english:\"Debian DSA-2850-1 : libyaml - heap-based buffer overflow\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Florian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with\na specially crafted tag that, when parsed by an application using\nlibyaml, would cause the application to crash or, potentially, execute\narbitrary code with the privileges of the user running the\napplication.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737076\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/squeeze/libyaml\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/libyaml\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2014/dsa-2850\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the libyaml packages.\n\nFor the oldstable distribution (squeeze), this problem has been fixed\nin version 0.1.3-1+deb6u2.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.1.4-2+deb7u2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libyaml\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:6.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/02/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"6.0\", prefix:\"libyaml-0-2\", reference:\"0.1.3-1+deb6u2\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"libyaml-dev\", reference:\"0.1.3-1+deb6u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libyaml-0-2\", reference:\"0.1.4-2+deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libyaml-0-2-dbg\", reference:\"0.1.4-2+deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libyaml-dev\", reference:\"0.1.4-2+deb7u2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:49:43", "description": "This update fixes the following security issue with libyaml :\n\n - bnc#860617: Fixed heap based buffer overflow due to integer misuse (CVE-2013-6393)", "cvss3": {"score": null, "vector": null}, "published": "2014-06-13T00:00:00", "type": "nessus", "title": "openSUSE Security Update : libyaml (openSUSE-SU-2014:0272-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libyaml-0-2", "p-cpe:/a:novell:opensuse:libyaml-0-2-debuginfo", "p-cpe:/a:novell:opensuse:libyaml-debugsource", "p-cpe:/a:novell:opensuse:libyaml-devel", "cpe:/o:novell:opensuse:12.3", "cpe:/o:novell:opensuse:13.1"], "id": "OPENSUSE-2014-150.NASL", "href": "https://www.tenable.com/plugins/nessus/75262", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2014-150.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75262);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-6393\");\n script_bugtraq_id(65258);\n\n script_name(english:\"openSUSE Security Update : libyaml (openSUSE-SU-2014:0272-1)\");\n script_summary(english:\"Check for the openSUSE-2014-150 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes the following security issue with libyaml :\n\n - bnc#860617: Fixed heap based buffer overflow due to\n integer misuse (CVE-2013-6393)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=860617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2014-02/msg00064.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libyaml packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libyaml-0-2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libyaml-0-2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libyaml-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libyaml-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/02/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.3|SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.3 / 13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libyaml-0-2-0.1.3-11.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libyaml-0-2-debuginfo-0.1.3-11.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libyaml-debugsource-0.1.3-11.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libyaml-devel-0.1.3-11.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libyaml-0-2-0.1.4-2.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libyaml-0-2-debuginfo-0.1.4-2.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libyaml-debugsource-0.1.4-2.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libyaml-devel-0.1.4-2.4.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libyaml-0-2 / libyaml-0-2-debuginfo / libyaml-debugsource / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:51:23", "description": "A vulnerability has been discovered and corrected in yaml :\n\nThe yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow (CVE-2013-6393).\n\nThe updated packages have been upgraded to the 0.1.5 version which is not vulnerable to this issue.", "cvss3": {"score": null, "vector": null}, "published": "2014-02-17T00:00:00", "type": "nessus", "title": "Mandriva Linux Security Advisory : yaml (MDVSA-2014:034)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:lib64yaml-devel", "p-cpe:/a:mandriva:linux:lib64yaml0_2", "cpe:/o:mandriva:business_server:1"], "id": "MANDRIVA_MDVSA-2014-034.NASL", "href": "https://www.tenable.com/plugins/nessus/72532", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2014:034. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72532);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-6393\");\n script_bugtraq_id(65258);\n script_xref(name:\"MDVSA\", value:\"2014:034\");\n\n script_name(english:\"Mandriva Linux Security Advisory : yaml (MDVSA-2014:034)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability has been discovered and corrected in yaml :\n\nThe yaml_parser_scan_tag_uri function in scanner.c in LibYAML before\n0.1.5 performs an incorrect cast, which allows remote attackers to\ncause a denial of service (application crash) and possibly execute\narbitrary code via crafted tags in a YAML document, which triggers a\nheap-based buffer overflow (CVE-2013-6393).\n\nThe updated packages have been upgraded to the 0.1.5 version which is\nnot vulnerable to this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bitbucket.org/xi/libyaml/commits/tag/0.1.5\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected lib64yaml-devel and / or lib64yaml0_2 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64yaml-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64yaml0_2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/02/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/02/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"lib64yaml-devel-0.1.5-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"lib64yaml0_2-0.1.5-1.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:51:04", "description": "Add patches for CVE-2013-6393 (bz1033990)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2014-02-10T00:00:00", "type": "nessus", "title": "Fedora 20 : libyaml-0.1.4-6.fc20 (2014-1851)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:libyaml", "cpe:/o:fedoraproject:fedora:20"], "id": "FEDORA_2014-1851.NASL", "href": "https://www.tenable.com/plugins/nessus/72408", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-1851.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72408);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-6393\");\n script_bugtraq_id(65258);\n script_xref(name:\"FEDORA\", value:\"2014-1851\");\n\n script_name(english:\"Fedora 20 : libyaml-0.1.4-6.fc20 (2014-1851)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Add patches for CVE-2013-6393 (bz1033990)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1033990\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-February/127981.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5ada5945\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libyaml package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libyaml\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:20\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/02/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^20([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 20.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC20\", reference:\"libyaml-0.1.4-6.fc20\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libyaml\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:51:04", "description": "Add patches for CVE-2013-6393 (bz1033990)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2014-02-10T00:00:00", "type": "nessus", "title": "Fedora 19 : libyaml-0.1.4-6.fc19 (2014-1817)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:libyaml", "cpe:/o:fedoraproject:fedora:19"], "id": "FEDORA_2014-1817.NASL", "href": "https://www.tenable.com/plugins/nessus/72405", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-1817.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72405);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-6393\");\n script_bugtraq_id(65258);\n script_xref(name:\"FEDORA\", value:\"2014-1817\");\n\n script_name(english:\"Fedora 19 : libyaml-0.1.4-6.fc19 (2014-1817)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Add patches for CVE-2013-6393 (bz1033990)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1033990\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-February/127986.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5ae4aa14\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libyaml package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libyaml\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:19\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/02/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^19([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 19.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC19\", reference:\"libyaml-0.1.4-6.fc19\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libyaml\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:51:18", "description": "libyaml was prone to a heap overflow that could result in arbitrary code execution. Pkg uses libyaml to parse the package manifests in some cases. Pkg also used libyaml to parse the remote repository until 1.2.\n\nRedHat Product Security Team reports on libyaml :\n\nA heap-based buffer overflow flaw was found in the way libyaml parsed YAML tags. A remote attacker could provide a specially crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.", "cvss3": {"score": null, "vector": null}, "published": "2014-02-03T00:00:00", "type": "nessus", "title": "FreeBSD : libyaml heap overflow resulting in possible code execution (111f1f84-1d14-4ff2-a9ea-cf07119c0d3b)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:libyaml", "p-cpe:/a:freebsd:freebsd:pkg", "p-cpe:/a:freebsd:freebsd:pkg-devel", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_111F1F841D144FF2A9EACF07119C0D3B.NASL", "href": "https://www.tenable.com/plugins/nessus/72247", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72247);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-6393\");\n\n script_name(english:\"FreeBSD : libyaml heap overflow resulting in possible code execution (111f1f84-1d14-4ff2-a9ea-cf07119c0d3b)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"libyaml was prone to a heap overflow that could result in arbitrary\ncode execution. Pkg uses libyaml to parse the package manifests in\nsome cases. Pkg also used libyaml to parse the remote repository until\n1.2.\n\nRedHat Product Security Team reports on libyaml :\n\nA heap-based buffer overflow flaw was found in the way libyaml parsed\nYAML tags. A remote attacker could provide a specially crafted YAML\ndocument that, when parsed by an application using libyaml, would\ncause the application to crash or, potentially, execute arbitrary code\nwith the privileges of the user running the application.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1033990\"\n );\n # https://vuxml.freebsd.org/freebsd/111f1f84-1d14-4ff2-a9ea-cf07119c0d3b.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?057645b0\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:libyaml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:pkg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:pkg-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/11/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/02/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/02/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"libyaml<0.1.4_3\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"pkg<1.2.6\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"pkg-devel<1.2.6\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:49:31", "description": "libyaml was updated to fix a regression introduced by the previous security patch for CVE-2013-6393.", "cvss3": {"score": null, "vector": null}, "published": "2014-06-13T00:00:00", "type": "nessus", "title": "openSUSE Security Update : libyaml (openSUSE-SU-2014:0381-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libyaml-0-2", "p-cpe:/a:novell:opensuse:libyaml-0-2-debuginfo", "p-cpe:/a:novell:opensuse:libyaml-debugsource", "p-cpe:/a:novell:opensuse:libyaml-devel", "cpe:/o:novell:opensuse:12.3", "cpe:/o:novell:opensuse:13.1"], "id": "OPENSUSE-2014-215.NASL", "href": "https://www.tenable.com/plugins/nessus/75296", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2014-215.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75296);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-6393\");\n\n script_name(english:\"openSUSE Security Update : libyaml (openSUSE-SU-2014:0381-1)\");\n script_summary(english:\"Check for the openSUSE-2014-215 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"libyaml was updated to fix a regression introduced by the previous\nsecurity patch for CVE-2013-6393.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=860617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2014-03/msg00045.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libyaml packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libyaml-0-2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libyaml-0-2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libyaml-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libyaml-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/03/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.3|SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.3 / 13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libyaml-0-2-0.1.3-11.8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libyaml-0-2-debuginfo-0.1.3-11.8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libyaml-debugsource-0.1.3-11.8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libyaml-devel-0.1.3-11.8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libyaml-0-2-0.1.4-2.8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libyaml-0-2-debuginfo-0.1.4-2.8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libyaml-debugsource-0.1.4-2.8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libyaml-devel-0.1.4-2.8.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libyaml\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:50:43", "description": "This update addressed two security issues.\n\nCVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.\n\nCVE-2014-2525: The library is affected by a heap-based buffer overflow which can lead to arbitrary code execution. The vulnerability is caused by lack of proper expansion for the string passed to the yaml_parser_scan_uri_escapes() function. A specially crafted YAML file, with a long sequence of percent-encoded characters in a URL, can be used to trigger the overflow.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2014-04-07T00:00:00", "type": "nessus", "title": "Fedora 19 : perl-YAML-LibYAML-0.41-4.fc19 (2014-4517)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:perl-YAML-LibYAML", "cpe:/o:fedoraproject:fedora:19"], "id": "FEDORA_2014-4517.NASL", "href": "https://www.tenable.com/plugins/nessus/73364", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-4517.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73364);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_bugtraq_id(65258);\n script_xref(name:\"FEDORA\", value:\"2014-4517\");\n\n script_name(english:\"Fedora 19 : perl-YAML-LibYAML-0.41-4.fc19 (2014-4517)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update addressed two security issues.\n\nCVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in\nLibYAML before 0.1.5 performs an incorrect cast, which allows remote\nattackers to cause a denial of service (application crash) and\npossibly execute arbitrary code via crafted tags in a YAML document,\nwhich triggers a heap-based buffer overflow.\n\nCVE-2014-2525: The library is affected by a heap-based buffer overflow\nwhich can lead to arbitrary code execution. The vulnerability is\ncaused by lack of proper expansion for the string passed to the\nyaml_parser_scan_uri_escapes() function. A specially crafted YAML\nfile, with a long sequence of percent-encoded characters in a URL, can\nbe used to trigger the overflow.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1033990\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1078083\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131200.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?760b9d36\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-YAML-LibYAML package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-YAML-LibYAML\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:19\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/03/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^19([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 19.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC19\", reference:\"perl-YAML-LibYAML-0.41-4.fc19\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-YAML-LibYAML\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:50:41", "description": "Updated perl-YAML-LibYAML packages fix security vulnerabilities :\n\nFlorian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-6393).\n\nIvan Fratric of the Google Security Team discovered a heap-based buffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a specially crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2014-2525).\n\nThe perl-YAML-LibYAML package is being updated as it contains an embedded copy of LibYAML.", "cvss3": {"score": null, "vector": null}, "published": "2014-04-10T00:00:00", "type": "nessus", "title": "Mandriva Linux Security Advisory : perl-YAML-LibYAML (MDVSA-2014:069)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:perl-YAML-LibYAML", "cpe:/o:mandriva:business_server:1"], "id": "MANDRIVA_MDVSA-2014-069.NASL", "href": "https://www.tenable.com/plugins/nessus/73445", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2014:069. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73445);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_bugtraq_id(65258, 66478);\n script_xref(name:\"MDVSA\", value:\"2014:069\");\n\n script_name(english:\"Mandriva Linux Security Advisory : perl-YAML-LibYAML (MDVSA-2014:069)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Mandriva Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated perl-YAML-LibYAML packages fix security vulnerabilities :\n\nFlorian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with\na specially crafted tag that, when parsed by an application using\nlibyaml, would cause the application to crash or, potentially, execute\narbitrary code with the privileges of the user running the application\n(CVE-2013-6393).\n\nIvan Fratric of the Google Security Team discovered a heap-based\nbuffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a specially crafted\nYAML document that, when parsed by an application using libyaml, would\ncause the application to crash or, potentially, execute arbitrary code\nwith the privileges of the user running the application\n(CVE-2014-2525).\n\nThe perl-YAML-LibYAML package is being updated as it contains an\nembedded copy of LibYAML.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2014-0154.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-YAML-LibYAML package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:perl-YAML-LibYAML\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"perl-YAML-LibYAML-0.380.0-2.2.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:50:34", "description": "This update addressed two security issues.\n\nCVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.\n\nCVE-2014-2525: The library is affected by a heap-based buffer overflow which can lead to arbitrary code execution. The vulnerability is caused by lack of proper expansion for the string passed to the yaml_parser_scan_uri_escapes() function. A specially crafted YAML file, with a long sequence of percent-encoded characters in a URL, can be used to trigger the overflow.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2014-04-07T00:00:00", "type": "nessus", "title": "Fedora 20 : perl-YAML-LibYAML-0.41-4.fc20 (2014-4548)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:perl-YAML-LibYAML", "cpe:/o:fedoraproject:fedora:20"], "id": "FEDORA_2014-4548.NASL", "href": "https://www.tenable.com/plugins/nessus/73366", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-4548.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73366);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_bugtraq_id(65258);\n script_xref(name:\"FEDORA\", value:\"2014-4548\");\n\n script_name(english:\"Fedora 20 : perl-YAML-LibYAML-0.41-4.fc20 (2014-4548)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update addressed two security issues.\n\nCVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in\nLibYAML before 0.1.5 performs an incorrect cast, which allows remote\nattackers to cause a denial of service (application crash) and\npossibly execute arbitrary code via crafted tags in a YAML document,\nwhich triggers a heap-based buffer overflow.\n\nCVE-2014-2525: The library is affected by a heap-based buffer overflow\nwhich can lead to arbitrary code execution. The vulnerability is\ncaused by lack of proper expansion for the string passed to the\nyaml_parser_scan_uri_escapes() function. A specially crafted YAML\nfile, with a long sequence of percent-encoded characters in a URL, can\nbe used to trigger the overflow.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1033990\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1078083\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131190.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?506f754f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-YAML-LibYAML package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-YAML-LibYAML\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:20\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/03/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^20([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 20.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC20\", reference:\"perl-YAML-LibYAML-0.41-4.fc20\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-YAML-LibYAML\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:50:19", "description": "The remote CentOS host is missing a security update which has been documented in Red Hat advisory RHSA-2014:0355.", "cvss3": {"score": null, "vector": null}, "published": "2014-05-22T00:00:00", "type": "nessus", "title": "CentOS 6 : Important: / ruby193-libyaml (CESA-2014:0355)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos-scl:ruby193-libyaml", "p-cpe:/a:centos:centos-scl:ruby193-libyaml-devel", "cpe:/o:centos:centos:6"], "id": "CENTOS_RHSA-2014-0355.NASL", "href": "https://www.tenable.com/plugins/nessus/74126", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:0355 and \n# CentOS Errata and Security Advisory 2014:0355 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74126);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_bugtraq_id(65258, 66478);\n script_xref(name:\"RHSA\", value:\"2014:0355\");\n\n script_name(english:\"CentOS 6 : Important: / ruby193-libyaml (CESA-2014:0355)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote CentOS host is missing a security update which has been\ndocumented in Red Hat advisory RHSA-2014:0355.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-May/020307.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?47297afd\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected important: and / or ruby193-libyaml packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-6393\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos-scl:ruby193-libyaml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos-scl:ruby193-libyaml-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/02/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/05/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", cpu:\"x86_64\", reference:\"ruby193-libyaml-0.1.4-5.1.el6.centos.alt\")) flag++;\nif (rpm_check(release:\"CentOS-6\", cpu:\"x86_64\", reference:\"ruby193-libyaml-devel-0.1.4-5.1.el6.centos.alt\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ruby193-libyaml / ruby193-libyaml-devel\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:22:35", "description": "According to the versions of the libyaml package installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities :\n\n - Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.(CVE-2014-2525)\n\n - The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.(CVE-2013-6393)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2019-05-14T00:00:00", "type": "nessus", "title": "EulerOS Virtualization 3.0.1.0 : libyaml (EulerOS-SA-2019-1445)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:libyaml", "cpe:/o:huawei:euleros:uvp:3.0.1.0"], "id": "EULEROS_SA-2019-1445.NASL", "href": "https://www.tenable.com/plugins/nessus/124948", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(124948);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2013-6393\",\n \"CVE-2014-2525\"\n );\n script_bugtraq_id(\n 65258,\n 66478\n );\n\n script_name(english:\"EulerOS Virtualization 3.0.1.0 : libyaml (EulerOS-SA-2019-1445)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the libyaml package installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerabilities :\n\n - Heap-based buffer overflow in the\n yaml_parser_scan_uri_escapes function in LibYAML before\n 0.1.6 allows context-dependent attackers to execute\n arbitrary code via a long sequence of percent-encoded\n characters in a URI in a YAML file.(CVE-2014-2525)\n\n - The yaml_parser_scan_tag_uri function in scanner.c in\n LibYAML before 0.1.5 performs an incorrect cast, which\n allows remote attackers to cause a denial of service\n (application crash) and possibly execute arbitrary code\n via crafted tags in a YAML document, which triggers a\n heap-based buffer overflow.(CVE-2013-6393)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1445\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?92b6cd86\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected libyaml packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libyaml\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.1.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.1.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.1.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"libyaml-0.1.4-11.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libyaml\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-16T01:59:22", "description": "The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.\n\nHeap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.", "cvss3": {"score": null, "vector": null}, "published": "2014-04-23T00:00:00", "type": "nessus", "title": "Amazon Linux AMI : perl-YAML-LibYAML (ALAS-2014-324)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2018-04-18T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:perl-YAML-LibYAML", "p-cpe:/a:amazon:linux:perl-YAML-LibYAML-debuginfo", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2014-324.NASL", "href": "https://www.tenable.com/plugins/nessus/73652", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2014-324.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(73652);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2018/04/18 15:09:35\");\n\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_xref(name:\"ALAS\", value:\"2014-324\");\n\n script_name(english:\"Amazon Linux AMI : perl-YAML-LibYAML (ALAS-2014-324)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before\n0.1.5 performs an incorrect cast, which allows remote attackers to\ncause a denial of service (application crash) and possibly execute\narbitrary code via crafted tags in a YAML document, which triggers a\nheap-based buffer overflow.\n\nHeap-based buffer overflow in the yaml_parser_scan_uri_escapes\nfunction in LibYAML before 0.1.6 allows context-dependent attackers to\nexecute arbitrary code via a long sequence of percent-encoded\ncharacters in a URI in a YAML file.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2014-324.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update perl-YAML-LibYAML' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perl-YAML-LibYAML\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perl-YAML-LibYAML-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"perl-YAML-LibYAML-0.41-4.9.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perl-YAML-LibYAML-debuginfo-0.41-4.9.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-YAML-LibYAML / perl-YAML-LibYAML-debuginfo\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:47:43", "description": "Updated libyaml packages that fix two security issues are now available for Red Hat Common for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nYAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C.\n\nA buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2014-2525)\n\nAn integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2013-6393)\n\nRed Hat would like to thank oCERT for reporting the CVE-2014-2525 issue. oCERT acknowledges Ivan Fratric of the Google Security Team as the original reporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the Red Hat Product Security Team.\n\nNote: In their default configuration, applications distributed via the Red Hat Common channel do not use the libyaml library for parsing YAML, and are therefore not vulnerable to these issues.\n\nAll libyaml users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running applications linked against the libyaml library must be restarted for this update to take effect.", "cvss3": {"score": null, "vector": null}, "published": "2014-11-08T00:00:00", "type": "nessus", "title": "RHEL 6 : libyaml (RHSA-2014:0415)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:libyaml", "p-cpe:/a:redhat:enterprise_linux:libyaml-devel", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2014-0415.NASL", "href": "https://www.tenable.com/plugins/nessus/79012", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:0415. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79012);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_xref(name:\"RHSA\", value:\"2014:0415\");\n\n script_name(english:\"RHEL 6 : libyaml (RHSA-2014:0415)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated libyaml packages that fix two security issues are now\navailable for Red Hat Common for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nYAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and\nemitter written in C.\n\nA buffer overflow flaw was found in the way the libyaml library parsed\nURLs in YAML documents. An attacker able to load specially crafted\nYAML input to an application using libyaml could cause the application\nto crash or, potentially, execute arbitrary code with the privileges\nof the user running the application. (CVE-2014-2525)\n\nAn integer overflow flaw was found in the way the libyaml library\nhandled excessively long YAML tags. An attacker able to load specially\ncrafted YAML input to application using libyaml could cause the\napplication to crash or, potentially, execute arbitrary code with the\nprivileges of the user running the application. (CVE-2013-6393)\n\nRed Hat would like to thank oCERT for reporting the CVE-2014-2525\nissue. oCERT acknowledges Ivan Fratric of the Google Security Team as\nthe original reporter. The CVE-2013-6393 issue was discovered by\nFlorian Weimer of the Red Hat Product Security Team.\n\nNote: In their default configuration, applications distributed via the\nRed Hat Common channel do not use the libyaml library for parsing\nYAML, and are therefore not vulnerable to these issues.\n\nAll libyaml users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. All running\napplications linked against the libyaml library must be restarted for\nthis update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2014:0415\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-6393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2525\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libyaml and / or libyaml-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libyaml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libyaml-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/02/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:0415\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"libyaml-0.1.3-1.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"libyaml-devel-0.1.3-1.4.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libyaml / libyaml-devel\");\n }\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:50:34", "description": "Florian Weimer discovered that libyaml-libyaml-perl incorrectly handled certain large YAML documents. An attacker could use this issue to cause libyaml-libyaml-perl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2013-6393)\n\nIvan Fratric discovered that libyaml-libyaml-perl incorrectly handled certain malformed YAML documents. An attacker could use this issue to cause libyaml-libyaml-perl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2014-2525).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2014-04-04T00:00:00", "type": "nessus", "title": "Ubuntu 12.04 LTS / 12.10 / 13.10 : libyaml-libyaml-perl vulnerabilities (USN-2161-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libyaml-libyaml-perl", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:canonical:ubuntu_linux:13.10"], "id": "UBUNTU_USN-2161-1.NASL", "href": "https://www.tenable.com/plugins/nessus/73329", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2161-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73329);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_xref(name:\"USN\", value:\"2161-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS / 12.10 / 13.10 : libyaml-libyaml-perl vulnerabilities (USN-2161-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Florian Weimer discovered that libyaml-libyaml-perl incorrectly\nhandled certain large YAML documents. An attacker could use this issue\nto cause libyaml-libyaml-perl to crash, resulting in a denial of\nservice, or possibly execute arbitrary code. (CVE-2013-6393)\n\nIvan Fratric discovered that libyaml-libyaml-perl incorrectly handled\ncertain malformed YAML documents. An attacker could use this issue to\ncause libyaml-libyaml-perl to crash, resulting in a denial of service,\nor possibly execute arbitrary code. (CVE-2014-2525).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2161-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libyaml-libyaml-perl package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libyaml-libyaml-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:13.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/02/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04|12\\.10|13\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04 / 12.10 / 13.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"libyaml-libyaml-perl\", pkgver:\"0.38-2ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"libyaml-libyaml-perl\", pkgver:\"0.38-3ubuntu0.12.10.1\")) flag++;\nif (ubuntu_check(osver:\"13.10\", pkgname:\"libyaml-libyaml-perl\", pkgver:\"0.38-3ubuntu0.13.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libyaml-libyaml-perl\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:30", "description": "Updated yaml packages fix security vulnerabilities :\n\nFlorian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-6393).\n\nIvan Fratric of the Google Security Team discovered a heap-based buffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a specially crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2014-2525).\n\nAn assertion failure was found in the way the libyaml library parsed wrapped strings. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash (CVE-2014-9130).", "cvss3": {"score": null, "vector": null}, "published": "2015-03-19T00:00:00", "type": "nessus", "title": "Mandriva Linux Security Advisory : yaml (MDVSA-2015:060)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525", "CVE-2014-9130"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:lib64yaml-devel", "p-cpe:/a:mandriva:linux:lib64yaml0_2", "cpe:/o:mandriva:business_server:2"], "id": "MANDRIVA_MDVSA-2015-060.NASL", "href": "https://www.tenable.com/plugins/nessus/81943", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2015:060. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(81943);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\", \"CVE-2014-9130\");\n script_xref(name:\"MDVSA\", value:\"2015:060\");\n\n script_name(english:\"Mandriva Linux Security Advisory : yaml (MDVSA-2015:060)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated yaml packages fix security vulnerabilities :\n\nFlorian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with\na specially crafted tag that, when parsed by an application using\nlibyaml, would cause the application to crash or, potentially, execute\narbitrary code with the privileges of the user running the application\n(CVE-2013-6393).\n\nIvan Fratric of the Google Security Team discovered a heap-based\nbuffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a specially crafted\nYAML document that, when parsed by an application using libyaml, would\ncause the application to crash or, potentially, execute arbitrary code\nwith the privileges of the user running the application\n(CVE-2014-2525).\n\nAn assertion failure was found in the way the libyaml library parsed\nwrapped strings. An attacker able to load specially crafted YAML input\ninto an application using libyaml could cause the application to crash\n(CVE-2014-9130).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2014-0040.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2014-0150.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2014-0508.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected lib64yaml-devel and / or lib64yaml0_2 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64yaml-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64yaml0_2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS2\", cpu:\"x86_64\", reference:\"lib64yaml-devel-0.1.6-1.mbs2\")) flag++;\nif (rpm_check(release:\"MDK-MBS2\", cpu:\"x86_64\", reference:\"lib64yaml0_2-0.1.6-1.mbs2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:45:47", "description": "perl-YAML-LibYAML was updated to fix three security issues.\n\nThese security issues were fixed :\n\n - CVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performed an incorrect cast, which allowed remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggered a heap-based buffer overflow (bnc#860617, bnc#911782).\n\n - CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allowed context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping (bnc#907809, bnc#911782).\n\n - CVE-2014-2525: Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allowed context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file (bnc#868944, bnc#911782).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2015-05-28T00:00:00", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : perl-YAML-LibYAML (SUSE-SU-2015:0953-2)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525", "CVE-2014-9130"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML", "p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML-debuginfo", "p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML-debugsource", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2015-0953-2.NASL", "href": "https://www.tenable.com/plugins/nessus/83869", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2015:0953-2.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83869);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\", \"CVE-2014-9130\");\n script_bugtraq_id(65258, 66478, 71349);\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : perl-YAML-LibYAML (SUSE-SU-2015:0953-2)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"perl-YAML-LibYAML was updated to fix three security issues.\n\nThese security issues were fixed :\n\n - CVE-2013-6393: The yaml_parser_scan_tag_uri function in\n scanner.c in LibYAML before 0.1.5 performed an incorrect\n cast, which allowed remote attackers to cause a denial\n of service (application crash) and possibly execute\n arbitrary code via crafted tags in a YAML document,\n which triggered a heap-based buffer overflow\n (bnc#860617, bnc#911782).\n\n - CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as\n used in the YAML-LibYAML (aka YAML-XS) module for Perl,\n allowed context-dependent attackers to cause a denial of\n service (assertion failure and crash) via vectors\n involving line-wrapping (bnc#907809, bnc#911782).\n\n - CVE-2014-2525: Heap-based buffer overflow in the\n yaml_parser_scan_uri_escapes function in LibYAML before\n 0.1.6 allowed context-dependent attackers to execute\n arbitrary code via a long sequence of percent-encoded\n characters in a URI in a YAML file (bnc#868944,\n bnc#911782).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=860617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=868944\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=907809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=911782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2013-6393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2014-2525/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2014-9130/\"\n );\n # https://www.suse.com/support/update/announcement/2015/suse-su-20150953-2.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?931cf879\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-2015-215=1\n\nSUSE Linux Enterprise Desktop 12 :\n\nzypper in -t patch SUSE-SLE-DESKTOP-12-2015-215=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/02/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/02/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-YAML-LibYAML-0.38-10.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-YAML-LibYAML-debuginfo-0.38-10.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-YAML-LibYAML-debugsource-0.38-10.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-YAML-LibYAML-0.38-10.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-YAML-LibYAML-debuginfo-0.38-10.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"perl-YAML-LibYAML-debugsource-0.38-10.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-YAML-LibYAML\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:45:42", "description": "perl-YAML-LibYAML was updated to fix three security issues.\n\nThese security issues were fixed :\n\n - CVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performed an incorrect cast, which allowed remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggered a heap-based buffer overflow (bnc#860617, bnc#911782).\n\n - CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allowed context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping (bnc#907809, bnc#911782).\n\n - CVE-2014-2525: Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allowed context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file (bnc#868944, bnc#911782).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2015-05-28T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : perl-YAML-LibYAML (SUSE-SU-2015:0953-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525", "CVE-2014-9130"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML", "p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML-debuginfo", "p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML-debugsource", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2015-0953-1.NASL", "href": "https://www.tenable.com/plugins/nessus/83868", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2015:0953-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83868);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\", \"CVE-2014-9130\");\n script_bugtraq_id(65258, 66478, 71349);\n\n script_name(english:\"SUSE SLES12 Security Update : perl-YAML-LibYAML (SUSE-SU-2015:0953-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"perl-YAML-LibYAML was updated to fix three security issues.\n\nThese security issues were fixed :\n\n - CVE-2013-6393: The yaml_parser_scan_tag_uri function in\n scanner.c in LibYAML before 0.1.5 performed an incorrect\n cast, which allowed remote attackers to cause a denial\n of service (application crash) and possibly execute\n arbitrary code via crafted tags in a YAML document,\n which triggered a heap-based buffer overflow\n (bnc#860617, bnc#911782).\n\n - CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as\n used in the YAML-LibYAML (aka YAML-XS) module for Perl,\n allowed context-dependent attackers to cause a denial of\n service (assertion failure and crash) via vectors\n involving line-wrapping (bnc#907809, bnc#911782).\n\n - CVE-2014-2525: Heap-based buffer overflow in the\n yaml_parser_scan_uri_escapes function in LibYAML before\n 0.1.6 allowed context-dependent attackers to execute\n arbitrary code via a long sequence of percent-encoded\n characters in a URI in a YAML file (bnc#868944,\n bnc#911782).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=860617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=868944\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=907809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=911782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2013-6393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2014-2525/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2014-9130/\"\n );\n # https://www.suse.com/support/update/announcement/2015/suse-su-20150953-1.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0d7c667b\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-2015-215=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-YAML-LibYAML-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/02/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/02/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"s390x\") audit(AUDIT_ARCH_NOT, \"s390x\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"s390x\", reference:\"perl-YAML-LibYAML-0.38-10.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"s390x\", reference:\"perl-YAML-LibYAML-debuginfo-0.38-10.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"s390x\", reference:\"perl-YAML-LibYAML-debugsource-0.38-10.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-YAML-LibYAML\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:42:13", "description": "perl-YAML-LibYAML was updated to fix three security issues.\n\nThese security issues were fixed :\n\n - CVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performed an incorrect cast, which allowed remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggered a heap-based buffer overflow (bnc#860617, bnc#911782).\n\n - CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allowed context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping (bnc#907809, bnc#911782).\n\n - CVE-2014-2525: Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allowed context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file (bnc#868944, bnc#911782).\n\nThis update was imported from the SUSE:SLE-12:Update update project.", "cvss3": {"score": null, "vector": null}, "published": "2016-04-18T00:00:00", "type": "nessus", "title": "openSUSE Security Update : perl-YAML-LibYAML (openSUSE-2016-473)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525", "CVE-2014-9130"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:perl-YAML-LibYAML", "p-cpe:/a:novell:opensuse:perl-YAML-LibYAML-debuginfo", "p-cpe:/a:novell:opensuse:perl-YAML-LibYAML-debugsource", "cpe:/o:novell:opensuse:42.1"], "id": "OPENSUSE-2016-473.NASL", "href": "https://www.tenable.com/plugins/nessus/90563", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-473.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(90563);\n script_version(\"2.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\", \"CVE-2014-9130\");\n\n script_name(english:\"openSUSE Security Update : perl-YAML-LibYAML (openSUSE-2016-473)\");\n script_summary(english:\"Check for the openSUSE-2016-473 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"perl-YAML-LibYAML was updated to fix three security issues.\n\nThese security issues were fixed :\n\n - CVE-2013-6393: The yaml_parser_scan_tag_uri function in\n scanner.c in LibYAML before 0.1.5 performed an incorrect\n cast, which allowed remote attackers to cause a denial\n of service (application crash) and possibly execute\n arbitrary code via crafted tags in a YAML document,\n which triggered a heap-based buffer overflow\n (bnc#860617, bnc#911782).\n\n - CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as\n used in the YAML-LibYAML (aka YAML-XS) module for Perl,\n allowed context-dependent attackers to cause a denial of\n service (assertion failure and crash) via vectors\n involving line-wrapping (bnc#907809, bnc#911782).\n\n - CVE-2014-2525: Heap-based buffer overflow in the\n yaml_parser_scan_uri_escapes function in LibYAML before\n 0.1.6 allowed context-dependent attackers to execute\n arbitrary code via a long sequence of percent-encoded\n characters in a URI in a YAML file (bnc#868944,\n bnc#911782).\n\nThis update was imported from the SUSE:SLE-12:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=860617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=868944\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=907809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=911782\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-YAML-LibYAML packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-YAML-LibYAML\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-YAML-LibYAML-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-YAML-LibYAML-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/04/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/04/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.1\", reference:\"perl-YAML-LibYAML-0.38-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"perl-YAML-LibYAML-debuginfo-0.38-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"perl-YAML-LibYAML-debugsource-0.38-4.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-YAML-LibYAML / perl-YAML-LibYAML-debuginfo / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:46:53", "description": "perl-YAML-LibYAML was updated to version 0.59 to fix four security issues.\n\nThese security issues were fixed :\n\n - CVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allowed remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow (bnc#860617, bnc#911782).\n\n - CVE-2012-1152: Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allowed remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function (bnc#751503).\n\n - CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allowed context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping (bnc#907809, bnc#911782).\n\n - CVE-2014-2525: Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allowed context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file (bnc#868944, bnc#911782).\n\nThese non-security issues were fixed :\n\n - PR/23 Better scalar dump heuristics\n\n - More closely match YAML.pm\n\n - Add a VERSION statement to YAML::LibYAML (issue#8)\n\n - Applied fix for PR/21. nawglan++\n\n - Use Swim cpan-tail block functions in doc\n\n - Get YAML::XS using latest libyaml\n\n - Fix for https://bitbucket.org/xi/libyaml/issue/10/wrapped-string s-cause-assert-failure\n\n - Fix e1 test failure on 5.21.4\n\n - Remove =travis section\n\n - Meta 0.0.2\n\n - Eliminate spurious trailing whitespace\n\n - Add t/000-compile-modules.t\n\n - Fix swim errors\n\n - Add badges to doc\n\n - Fix ReadMe\n\n - Fix Meta and add Contributing.\n\n - Doc fix. GitHub-Issue-#6. Thanks to Debian Perl Group for finding this.\n\n - Test::Base tests needed 'inc' in @INC\n\n - Switch to Zilla::Dist\n\n - No longer dep on Test::Base, Spiffy, and Filter::Util::Call\n\n - Remove test/changes.t\n\n - Removed another C++ // style comment. jdb++\n\n - Removed C++ // style comments, for better portability.\n jdb++\n\n - Using the latest libyaml codebase\n\n- https://github.com/yaml/libyaml/tree/perl-yaml-xs\n\n - Changes have been made to start moving libyaml to 1.2", "cvss3": {"score": null, "vector": null}, "published": "2015-02-20T00:00:00", "type": "nessus", "title": "openSUSE Security Update : perl-YAML-LibYAML (openSUSE-2015-162)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1152", "CVE-2013-6393", "CVE-2014-2525", "CVE-2014-9130"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:perl-YAML-LibYAML", "p-cpe:/a:novell:opensuse:perl-YAML-LibYAML-debuginfo", "p-cpe:/a:novell:opensuse:perl-YAML-LibYAML-debugsource", "cpe:/o:novell:opensuse:13.1", "cpe:/o:novell:opensuse:13.2"], "id": "OPENSUSE-2015-162.NASL", "href": "https://www.tenable.com/plugins/nessus/81417", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-162.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(81417);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2012-1152\", \"CVE-2013-6393\", \"CVE-2014-2525\", \"CVE-2014-9130\");\n\n script_name(english:\"openSUSE Security Update : perl-YAML-LibYAML (openSUSE-2015-162)\");\n script_summary(english:\"Check for the openSUSE-2015-162 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"perl-YAML-LibYAML was updated to version 0.59 to fix four security\nissues.\n\nThese security issues were fixed :\n\n - CVE-2013-6393: The yaml_parser_scan_tag_uri function in\n scanner.c in LibYAML before 0.1.5 performs an incorrect\n cast, which allowed remote attackers to cause a denial\n of service (application crash) and possibly execute\n arbitrary code via crafted tags in a YAML document,\n which triggers a heap-based buffer overflow (bnc#860617,\n bnc#911782).\n\n - CVE-2012-1152: Multiple format string vulnerabilities in\n the error reporting functionality in the YAML::LibYAML\n (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for\n Perl allowed remote attackers to cause a denial of\n service (process crash) via format string specifiers in\n a (1) YAML stream to the Load function, (2) YAML node to\n the load_node function, (3) YAML mapping to the\n load_mapping function, or (4) YAML sequence to the\n load_sequence function (bnc#751503).\n\n - CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as\n used in the YAML-LibYAML (aka YAML-XS) module for Perl,\n allowed context-dependent attackers to cause a denial of\n service (assertion failure and crash) via vectors\n involving line-wrapping (bnc#907809, bnc#911782).\n\n - CVE-2014-2525: Heap-based buffer overflow in the\n yaml_parser_scan_uri_escapes function in LibYAML before\n 0.1.6 allowed context-dependent attackers to execute\n arbitrary code via a long sequence of percent-encoded\n characters in a URI in a YAML file (bnc#868944,\n bnc#911782).\n\nThese non-security issues were fixed :\n\n - PR/23 Better scalar dump heuristics\n\n - More closely match YAML.pm\n\n - Add a VERSION statement to YAML::LibYAML (issue#8)\n\n - Applied fix for PR/21. nawglan++\n\n - Use Swim cpan-tail block functions in doc\n\n - Get YAML::XS using latest libyaml\n\n - Fix for\n https://bitbucket.org/xi/libyaml/issue/10/wrapped-string\n s-cause-assert-failure\n\n - Fix e1 test failure on 5.21.4\n\n - Remove =travis section\n\n - Meta 0.0.2\n\n - Eliminate spurious trailing whitespace\n\n - Add t/000-compile-modules.t\n\n - Fix swim errors\n\n - Add badges to doc\n\n - Fix ReadMe\n\n - Fix Meta and add Contributing.\n\n - Doc fix. GitHub-Issue-#6. Thanks to Debian Perl Group\n for finding this.\n\n - Test::Base tests needed 'inc' in @INC\n\n - Switch to Zilla::Dist\n\n - No longer dep on Test::Base, Spiffy, and\n Filter::Util::Call\n\n - Remove test/changes.t\n\n - Removed another C++ // style comment. jdb++\n\n - Removed C++ // style comments, for better portability.\n jdb++\n\n - Using the latest libyaml codebase\n\n- https://github.com/yaml/libyaml/tree/perl-yaml-xs\n\n - Changes have been made to start moving libyaml to 1.2\"\n );\n # https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?82d71510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=751503\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=860617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=868944\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=907809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=911782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/yaml/libyaml/tree/perl-yaml-xs\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-YAML-LibYAML packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-YAML-LibYAML\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-YAML-LibYAML-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-YAML-LibYAML-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/02/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/02/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"perl-YAML-LibYAML-0.59-6.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"perl-YAML-LibYAML-debuginfo-0.59-6.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"perl-YAML-LibYAML-debugsource-0.59-6.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"perl-YAML-LibYAML-0.59-2.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"perl-YAML-LibYAML-debuginfo-0.59-2.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"perl-YAML-LibYAML-debugsource-0.59-2.4.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-YAML-LibYAML / perl-YAML-LibYAML-debuginfo / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:50:15", "description": "The remote host is running a version of Mac OS X that is older than 10.9.3, and is thus missing security-related fixes for the following components:\n\n - CFNetwork HTTPProtocol\n - CoreServicesUIAgent\n - FontParser\n - Heimdal Kerberos\n - ImageIO\n - Intel Graphics Driver\n - IOKit Kernel\n - Kernel\n - Power Management\n - Ruby\n - Security\n - Secure Transport\n - Window Server\n\nNote that successful exploitation of the most serious issues could result in arbitrary code execution.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2014-05-27T00:00:00", "type": "nessus", "title": "Mac OS X < 10.9.3 Multiple Vulnerabilities (Security Update 2014-002)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2013-4164", "CVE-2014-1319", "CVE-2014-1321", "CVE-2014-1322", "CVE-2014-1295", "CVE-2013-5170", "CVE-2014-1318", "CVE-2014-1316", "CVE-2014-1314", "CVE-2014-1296", "CVE-2014-1315", "CVE-2014-1320"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"], "id": "8265.PRM", "href": "https://www.tenable.com/plugins/nnm/8265", "sourceData": "Binary data 8265.prm", "cvss": {"score": 10, "vector": "CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-16T14:40:53", "description": "The remote host is running a version of Mac OS X 10.7, 10.8, or 10.9 that does not have Security Update 2014-002 applied. This update contains several security-related fixes for the following components :\n\n - CFNetwork HTTPProtocl\n - CoreServicesUIAgent\n - FontParser\n - Heimdal Kerberos\n - ImageIO\n - Intel Graphics Driver\n - IOKit Kernel\n - Kernel\n - Power Management\n - Ruby\n - Security - Secure Transport\n - Window Server\n\nNote that successful exploitation of the most serious issues could result in arbitrary code execution.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2014-04-22T00:00:00", "type": "nessus", "title": "Mac OS X Multiple Vulnerabilities (Security Update 2014-002)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-4164", "CVE-2013-5170", "CVE-2013-6393", "CVE-2014-1295", "CVE-2014-1296", "CVE-2014-1314", "CVE-2014-1315", "CVE-2014-1316", "CVE-2014-1318", "CVE-2014-1319", "CVE-2014-1320", "CVE-2014-1321", "CVE-2014-1322", "CVE-2014-2234"], "modified": "2019-06-19T00:00:00", "cpe": ["cpe:/o:apple:mac_os_x"], "id": "MACOSX_SECUPD2014-002.NASL", "href": "https://www.tenable.com/plugins/nessus/73648", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\n\nif (description)\n{\n script_id(73648);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2019/06/19 15:17:43\");\n\n script_cve_id(\n \"CVE-2013-4164\",\n \"CVE-2013-5170\",\n \"CVE-2013-6393\",\n \"CVE-2014-1295\",\n \"CVE-2014-1296\",\n \"CVE-2014-1314\",\n \"CVE-2014-1315\",\n \"CVE-2014-1316\",\n \"CVE-2014-1318\",\n \"CVE-2014-1319\",\n \"CVE-2014-1320\",\n \"CVE-2014-1321\",\n \"CVE-2014-1322\",\n \"CVE-2014-2234\"\n );\n script_bugtraq_id(\n 63330,\n 63873,\n 65258,\n 65989,\n 67021,\n 67022,\n 67023,\n 67024,\n 67025,\n 67026,\n 67027,\n 67028,\n 67029,\n 67030\n );\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2014-04-22-1\");\n\n script_name(english:\"Mac OS X Multiple Vulnerabilities (Security Update 2014-002)\");\n script_summary(english:\"Check for the presence of Security Update 2014-002\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a Mac OS X update that fixes multiple\nsecurity issues.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running a version of Mac OS X 10.7, 10.8, or 10.9\nthat does not have Security Update 2014-002 applied. This update\ncontains several security-related fixes for the following components :\n\n - CFNetwork HTTPProtocl\n - CoreServicesUIAgent\n - FontParser\n - Heimdal Kerberos\n - ImageIO\n - Intel Graphics Driver\n - IOKit Kernel\n - Kernel\n - Power Management\n - Ruby\n - Security - Secure Transport\n - Window Server\n\nNote that successful exploitation of the most serious issues could\nresult in arbitrary code execution.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.apple.com/en-us/HT202966\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securityfocus.com/archive/1/531900/30/0/threaded\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.apple.com/en-us/HT202991\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securityfocus.com/archive/1/532113/30/0/threaded\");\n script_set_attribute(attribute:\"solution\", value:\n\"Either install Security Update 2014-002 or upgrade to OS X Mavericks\n10.9.3.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-1314\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/10/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:apple:mac_os_x\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"Host/MacOSX/packages/boms\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\npatch = '2014-002';\n\n# Compare 2 patch numbers to determine if patch requirements are satisfied.\n# Return true if this patch or a later patch is applied\n# Return false otherwise\nfunction check_patch(year, number)\n{\n local_var p_split = split(patch, sep:'-');\n local_var p_year = int( p_split[0]);\n local_var p_num = int( p_split[1]);\n\n if (year > p_year) return TRUE;\n else if (year < p_year) return FALSE;\n else if (number >= p_num) return TRUE;\n else return FALSE;\n}\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (!os) audit(AUDIT_OS_NOT, \"Mac OS X\");\nif (!ereg(pattern:\"Mac OS X 10\\.[789]([^0-9]|$)\", string:os)) audit(AUDIT_OS_NOT, \"Mac OS X 10.7 / 10.8 / 10.9\");\nelse if (\"Mac OS X 10.7\" >< os && !ereg(pattern:\"Mac OS X 10\\.7($|\\.[0-5]([^0-9]|$))\", string:os)) exit(0, \"The remote host uses a version of Mac OS X Lion later than 10.7.5.\");\nelse if (\"Mac OS X 10.8\" >< os && !ereg(pattern:\"Mac OS X 10\\.8($|\\.[0-5]([^0-9]|$))\", string:os)) exit(0, \"The remote host uses a version of Mac OS X Mountain Lion later than 10.8.5.\");\nelse if (\"Mac OS X 10.9\" >< os && !ereg(pattern:\"Mac OS X 10\\.9($|\\.[0-2]([^0-9]|$))\", string:os)) exit(0, \"The remote host uses a version of Mac OS X Mavericks later than 10.9.2.\");\n\npackages = get_kb_item_or_exit(\"Host/MacOSX/packages/boms\", exit_code:1);\nsec_boms_report = egrep(pattern:\"^com\\.apple\\.pkg\\.update\\.security\\..*bom$\", string:packages);\nsec_boms = split(sec_boms_report, sep:'\\n');\n\nforeach package (sec_boms)\n{\n # Grab patch year and number\n match = eregmatch(pattern:\"[^0-9](20[0-9][0-9])[-.]([0-9]{3})[^0-9]\", string:package);\n if (empty_or_null(match[1]) || empty_or_null(match[2]))\n continue;\n\n patch_found = check_patch(year:int(match[1]), number:int(match[2]));\n if (patch_found) exit(0, \"The host has Security Update \" + patch + \" or later installed and is therefore not affected.\");\n}\n\nreport = '\\n Missing security update : ' + patch;\nreport += '\\n Installed security BOMs : ';\nif (sec_boms_report) report += str_replace(find:'\\n', replace:'\\n ', string:sec_boms_report);\nelse report += 'n/a';\nreport += '\\n';\n\nsecurity_report_v4(port:0, severity:SECURITY_HOLE, extra:report);\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:48:17", "description": "The remote Mac OS X host has a version of OS X Server installed that is prior to version 4.0. It is, therefore, affected by the following vulnerabilities :\n\n - There are multiple vulnerabilities within the included BIND, the most serious of which can lead to a denial of service. (CVE-2013-3919, CVE-2013-4854, CVE-2014-0591)\n\n - There are multiple vulnerabilities within the included LibYAML for the Profile Manager and ServerRuby, the most serious of which can lead to arbitrary code execution.\n (CVE-2013-4164, CVE-2013-6393)\n\n - There are multiple vulnerabilities within the included PostgreSQL, the most serious of which can lead to arbitrary code execution. (CVE-2014-0060, CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064, CVE-2014-0065, CVE-2014-0066)\n\n - An error exists related to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. A man-in-the-middle attacker can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. This is also known as the 'POODLE' issue. (CVE-2014-3566)\n\n - A cross-site scripting flaw exists in the Xcode Server due to not properly validating input before returning it to the user. This can allow a remote attacker, using a specially crafted request, to execute code within the browser / server trust relationship. (CVE-2014-4406)\n\n - A SQL injection flaw exists in the Wiki Server due to not properly sanitizing user input before using it in SQL queries. This can allow a remote attacker, using a specially crafted request, to inject or manipulate SQL queries, thus allowing the manipulation or disclosure of arbitrary data. (CVE-2014-4424)\n\n - A restriction bypass flaw exists in the Mail Server due to SCAL changes being cached and not enforced until the service had restarted. This can allow an authenticated remote attacker to bypass those restrictions.\n (CVE-2014-4446)\n\n - A password disclosure flaw exists in the Profile Manager due to passwords being potentially saved to a file when editing or setting up a profile. This can allow a local attacker to gain access to password information.\n (CVE-2014-4447)", "cvss3": {"score": null, "vector": null}, "published": "2014-10-21T00:00:00", "type": "nessus", "title": "Mac OS X : OS X Server < 4.0 Multiple Vulnerabilities (POODLE)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-3919", "CVE-2013-4164", "CVE-2013-4854", "CVE-2013-6393", "CVE-2014-0060", "CVE-2014-0061", "CVE-2014-0062", "CVE-2014-0063", "CVE-2014-0064", "CVE-2014-0065", "CVE-2014-0066", "CVE-2014-0591", "CVE-2014-3566", "CVE-2014-4406", "CVE-2014-4424", "CVE-2014-4446", "CVE-2014-4447"], "modified": "2019-11-25T00:00:00", "cpe": ["cpe:/o:apple:mac_os_x_server"], "id": "MACOSX_SERVER_4_0.NASL", "href": "https://www.tenable.com/plugins/nessus/78601", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78601);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2019/11/25\");\n\n script_cve_id(\n \"CVE-2013-3919\",\n \"CVE-2013-4164\",\n \"CVE-2013-4854\",\n \"CVE-2013-6393\",\n \"CVE-2014-0060\",\n \"CVE-2014-0061\",\n \"CVE-2014-0062\",\n \"CVE-2014-0063\",\n \"CVE-2014-0064\",\n \"CVE-2014-0065\",\n \"CVE-2014-0066\",\n \"CVE-2014-0591\",\n \"CVE-2014-3566\",\n \"CVE-2014-4406\",\n \"CVE-2014-4424\",\n \"CVE-2014-4446\",\n \"CVE-2014-4447\"\n );\n script_bugtraq_id(\n 60338,\n 61479,\n 63873,\n 64801,\n 65258,\n 65719,\n 65723,\n 65724,\n 65725,\n 65727,\n 65728,\n 65731,\n 69918,\n 69935,\n 70574\n );\n script_xref(name:\"CERT\", value:\"577193\");\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2014-10-16-3\");\n\n script_name(english:\"Mac OS X : OS X Server < 4.0 Multiple Vulnerabilities (POODLE)\");\n script_summary(english:\"Checks the OS X Server version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a security update for OS X Server.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Mac OS X host has a version of OS X Server installed that\nis prior to version 4.0. It is, therefore, affected by the following\nvulnerabilities :\n\n - There are multiple vulnerabilities within the included\n BIND, the most serious of which can lead to a denial of\n service. (CVE-2013-3919, CVE-2013-4854, CVE-2014-0591)\n\n - There are multiple vulnerabilities within the included\n LibYAML for the Profile Manager and ServerRuby, the most\n serious of which can lead to arbitrary code execution.\n (CVE-2013-4164, CVE-2013-6393)\n\n - There are multiple vulnerabilities within the included\n PostgreSQL, the most serious of which can lead to\n arbitrary code execution. (CVE-2014-0060, CVE-2014-0061,\n CVE-2014-0062, CVE-2014-0063, CVE-2014-0064,\n CVE-2014-0065, CVE-2014-0066)\n\n - An error exists related to the way SSL 3.0 handles\n padding bytes when decrypting messages encrypted using\n block ciphers in cipher block chaining (CBC) mode. A\n man-in-the-middle attacker can decrypt a selected byte\n of a cipher text in as few as 256 tries if they are able\n to force a victim application to repeatedly send the\n same data over newly created SSL 3.0 connections. This\n is also known as the 'POODLE' issue. (CVE-2014-3566)\n\n - A cross-site scripting flaw exists in the Xcode Server\n due to not properly validating input before returning it\n to the user. This can allow a remote attacker, using a\n specially crafted request, to execute code within the\n browser / server trust relationship. (CVE-2014-4406)\n\n - A SQL injection flaw exists in the Wiki Server due to\n not properly sanitizing user input before using it in\n SQL queries. This can allow a remote attacker, using a\n specially crafted request, to inject or manipulate SQL\n queries, thus allowing the manipulation or disclosure\n of arbitrary data. (CVE-2014-4424)\n\n - A restriction bypass flaw exists in the Mail Server due\n to SCAL changes being cached and not enforced until the\n service had restarted. This can allow an authenticated\n remote attacker to bypass those restrictions.\n (CVE-2014-4446)\n\n - A password disclosure flaw exists in the Profile Manager\n due to passwords being potentially saved to a file when\n editing or setting up a profile. This can allow a local\n attacker to gain access to password information.\n (CVE-2014-4447)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT6536\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securityfocus.com/archive/1/533722/30/0/threaded\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.imperialviolet.org/2014/10/14/poodle.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.openssl.org/~bodo/ssl-poodle.pdf\");\n script_set_attribute(attribute:\"see_also\", value:\"https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Mac OS X Server version 4.0 or later.\n\nNote that OS X Server 4.0 is available only for OS X 10.10 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-4424\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/10/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:apple:mac_os_x_server\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_server_services.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"MacOSX/Server/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (!os) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\nversion = get_kb_item_or_exit(\"MacOSX/Server/Version\");\n\nfixed_version = \"4.0\";\nif (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)\n{\n set_kb_item(name:'www/0/SQLInjection', value:TRUE);\n set_kb_item(name:'www/0/XSS', value:TRUE);\n\n if (report_verbosity > 0)\n {\n report =\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version + \n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, \"OS X Server\", version);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2019-05-29T18:37:12", "description": "Florian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.", "cvss3": {}, "published": "2014-01-31T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2850-1 (libyaml - heap-based buffer overflow)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2019-03-19T00:00:00", "id": "OPENVAS:1361412562310702850", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310702850", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2850.nasl 14302 2019-03-19 08:28:48Z cfischer $\n# Auto-generated from advisory DSA 2850-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.702850\");\n script_version(\"$Revision: 14302 $\");\n script_cve_id(\"CVE-2013-6393\");\n script_name(\"Debian Security Advisory DSA 2850-1 (libyaml - heap-based buffer overflow)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 09:28:48 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-01-31 00:00:00 +0100 (Fri, 31 Jan 2014)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2014/dsa-2850.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(6|7)\");\n script_tag(name:\"affected\", value:\"libyaml on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (squeeze), this problem has been fixed in\nversion 0.1.3-1+deb6u2.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.1.4-2+deb7u2.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 0.1.4-3.\n\nWe recommend that you upgrade your libyaml packages.\");\n script_tag(name:\"summary\", value:\"Florian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libyaml-0-2\", ver:\"0.1.3-1+deb6u2\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libyaml-dev\", ver:\"0.1.3-1+deb6u2\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libyaml-0-2\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libyaml-0-2-dbg\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libyaml-dev\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:38", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-08-06T00:00:00", "type": "openvas", "title": "Fedora Update for libyaml FEDORA-2014-1851", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310862034", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862034", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libyaml FEDORA-2014-1851\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.862034\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-08-06 06:59:50 +0200 (Wed, 06 Aug 2014)\");\n script_cve_id(\"CVE-2013-6393\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for libyaml FEDORA-2014-1851\");\n script_tag(name:\"affected\", value:\"libyaml on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-1851\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-February/127981.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libyaml'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"libyaml\", rpm:\"libyaml~0.1.4~6.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-25T10:48:43", "description": "Florian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.\n\nThis update corrects this flaw in the copy that is embedded in the\nlibyaml-libyaml-perl package.", "cvss3": {}, "published": "2014-03-08T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2870-1 (libyaml-libyaml-perl - heap-based buffer overflow)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:702870", "href": "http://plugins.openvas.org/nasl.php?oid=702870", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2870.nasl 6637 2017-07-10 09:58:13Z teissa $\n# Auto-generated from advisory DSA 2870-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_affected = \"libyaml-libyaml-perl on Debian Linux\";\ntag_insight = \"YAML::LibYAML (or YAML::XS) is a Perl interface to Kirill Siminov's libyaml\nlibrary, a YAML Ain't Markup Language (YAML) implementation written in C to\nsupport the YAML 1.1 specification. There provided Dump and Load routines\nare compatible with the Perl YAML module (see libyaml-perl).\";\ntag_solution = \"For the oldstable distribution (squeeze), this problem has been fixed in\nversion 0.33-1+squeeze2.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.38-3+deb7u1.\n\nFor the testing distribution (jessie), this problem has been fixed in\nversion 0.41-4.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 0.41-4.\n\nWe recommend that you upgrade your libyaml-libyaml-perl packages.\";\ntag_summary = \"Florian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.\n\nThis update corrects this flaw in the copy that is embedded in the\nlibyaml-libyaml-perl package.\";\ntag_vuldetect = \"This check tests the installed software version using the apt package manager.\";\n\nif(description)\n{\n script_id(702870);\n script_version(\"$Revision: 6637 $\");\n script_cve_id(\"CVE-2013-6393\");\n script_name(\"Debian Security Advisory DSA 2870-1 (libyaml-libyaml-perl - heap-based buffer overflow)\");\n script_tag(name: \"last_modification\", value:\"$Date: 2017-07-10 11:58:13 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name: \"creation_date\", value:\"2014-03-08 00:00:00 +0100 (Sat, 08 Mar 2014)\");\n script_tag(name: \"cvss_base\", value:\"6.8\");\n script_tag(name: \"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2014/dsa-2870.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: tag_affected);\n script_tag(name: \"insight\", value: tag_insight);\n# script_tag(name: \"impact\", value: tag_impact);\n script_tag(name: \"solution\", value: tag_solution);\n script_tag(name: \"summary\", value: tag_summary);\n script_tag(name: \"vuldetect\", value: tag_vuldetect);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.33-1+squeeze2\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.38-3+deb7u1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.38-3+deb7u1\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.38-3+deb7u1\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.38-3+deb7u1\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-08-04T10:49:15", "description": "Florian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.", "cvss3": {}, "published": "2014-01-31T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2850-1 (libyaml - heap-based buffer overflow)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2017-07-20T00:00:00", "id": "OPENVAS:702850", "href": "http://plugins.openvas.org/nasl.php?oid=702850", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2850.nasl 6769 2017-07-20 09:56:33Z teissa $\n# Auto-generated from advisory DSA 2850-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_affected = \"libyaml on Debian Linux\";\ntag_solution = \"For the oldstable distribution (squeeze), this problem has been fixed in\nversion 0.1.3-1+deb6u2.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.1.4-2+deb7u2.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 0.1.4-3.\n\nWe recommend that you upgrade your libyaml packages.\";\ntag_summary = \"Florian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.\";\ntag_vuldetect = \"This check tests the installed software version using the apt package manager.\";\n\nif(description)\n{\n script_id(702850);\n script_version(\"$Revision: 6769 $\");\n script_cve_id(\"CVE-2013-6393\");\n script_name(\"Debian Security Advisory DSA 2850-1 (libyaml - heap-based buffer overflow)\");\n script_tag(name: \"last_modification\", value:\"$Date: 2017-07-20 11:56:33 +0200 (Thu, 20 Jul 2017) $\");\n script_tag(name: \"creation_date\", value:\"2014-01-31 00:00:00 +0100 (Fri, 31 Jan 2014)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2014/dsa-2850.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: tag_affected);\n# script_tag(name: \"impact\", value: tag_impact);\n script_tag(name: \"solution\", value: tag_solution);\n script_tag(name: \"summary\", value: tag_summary);\n script_tag(name: \"vuldetect\", value: tag_vuldetect);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libyaml-0-2\", ver:\"0.1.3-1+deb6u2\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-dev\", ver:\"0.1.3-1+deb6u2\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-0-2\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-0-2-dbg\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-dev\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-0-2\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-0-2-dbg\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-dev\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-0-2\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-0-2-dbg\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-dev\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-0-2\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-0-2-dbg\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libyaml-dev\", ver:\"0.1.4-2+deb7u2\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:37:46", "description": "Florian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.\n\nThis update corrects this flaw in the copy that is embedded in the\nlibyaml-libyaml-perl package.", "cvss3": {}, "published": "2014-03-08T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2870-1 (libyaml-libyaml-perl - heap-based buffer overflow)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2019-03-19T00:00:00", "id": "OPENVAS:1361412562310702870", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310702870", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2870.nasl 14302 2019-03-19 08:28:48Z cfischer $\n# Auto-generated from advisory DSA 2870-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.702870\");\n script_version(\"$Revision: 14302 $\");\n script_cve_id(\"CVE-2013-6393\");\n script_name(\"Debian Security Advisory DSA 2870-1 (libyaml-libyaml-perl - heap-based buffer overflow)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 09:28:48 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-03-08 00:00:00 +0100 (Sat, 08 Mar 2014)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2014/dsa-2870.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(6|7)\");\n script_tag(name:\"affected\", value:\"libyaml-libyaml-perl on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (squeeze), this problem has been fixed in\nversion 0.33-1+squeeze2.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.38-3+deb7u1.\n\nFor the testing distribution (jessie), this problem has been fixed in\nversion 0.41-4.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 0.41-4.\n\nWe recommend that you upgrade your libyaml-libyaml-perl packages.\");\n script_tag(name:\"summary\", value:\"Florian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.\n\nThis update corrects this flaw in the copy that is embedded in the\nlibyaml-libyaml-perl package.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.33-1+squeeze2\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.38-3+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:20", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-02-11T00:00:00", "type": "openvas", "title": "Ubuntu Update for libyaml USN-2098-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310841707", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841707", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2098_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for libyaml USN-2098-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841707\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-02-11 10:46:00 +0530 (Tue, 11 Feb 2014)\");\n script_cve_id(\"CVE-2013-6393\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Ubuntu Update for libyaml USN-2098-1\");\n\n script_tag(name:\"affected\", value:\"libyaml on Ubuntu 13.10,\n Ubuntu 12.10,\n Ubuntu 12.04 LTS\");\n script_tag(name:\"insight\", value:\"Florian Weimer discovered that LibYAML incorrectly handled\ncertain large yaml documents. An attacker could use this issue to cause LibYAML\nto crash, resulting in a denial of service, or possibly execute arbitrary\ncode.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2098-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2098-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libyaml'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(12\\.04 LTS|13\\.10|12\\.10)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-0-2\", ver:\"0.1.4-2ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-0-2:i386\", ver:\"0.1.4-2ubuntu0.13.10.1\", rls:\"UBUNTU13.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-0-2\", ver:\"0.1.4-2ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-03-17T23:00:55", "description": "The remote host is missing an update announced via the referenced Security Advisory.", "cvss3": {}, "published": "2015-09-08T00:00:00", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2014-291)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2020-03-13T00:00:00", "id": "OPENVAS:1361412562310120156", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120156", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120156\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:18:46 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2014-291)\");\n script_tag(name:\"insight\", value:\"The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.\");\n script_tag(name:\"solution\", value:\"Run yum update libyaml to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-291.html\");\n script_cve_id(\"CVE-2013-6393\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"libyaml-devel\", rpm:\"libyaml-devel~0.1.4~6.5.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libyaml-debuginfo\", rpm:\"libyaml-debuginfo~0.1.4~6.5.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libyaml\", rpm:\"libyaml~0.1.4~6.5.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:40", "description": "Gentoo Linux Local Security Checks GLSA 201403-02", "cvss3": {}, "published": "2015-09-29T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201403-02", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2018-10-26T00:00:00", "id": "OPENVAS:1361412562310121162", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121162", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201403-02.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121162\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:27:00 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201403-02\");\n script_tag(name:\"insight\", value:\"A heap-based buffer overflow flaw was found in the way libyaml parsed YAML tags.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201403-02\");\n script_cve_id(\"CVE-2013-6393\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201403-02\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"dev-libs/libyaml\", unaffected: make_list(\"ge 0.1.5\"), vulnerable: make_list(\"lt 0.1.5\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-12-04T11:16:37", "description": "Check for the Version of libyaml", "cvss3": {}, "published": "2014-02-11T00:00:00", "type": "openvas", "title": "Ubuntu Update for libyaml USN-2098-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:841707", "href": "http://plugins.openvas.org/nasl.php?oid=841707", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2098_1.nasl 7957 2017-12-01 06:40:08Z santu $\n#\n# Ubuntu Update for libyaml USN-2098-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(841707);\n script_version(\"$Revision: 7957 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:40:08 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-02-11 10:46:00 +0530 (Tue, 11 Feb 2014)\");\n script_cve_id(\"CVE-2013-6393\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Ubuntu Update for libyaml USN-2098-1\");\n\n tag_insight = \"Florian Weimer discovered that LibYAML incorrectly handled\ncertain large yaml documents. An attacker could use this issue to cause LibYAML\nto crash, resulting in a denial of service, or possibly execute arbitrary\ncode.\";\n\n tag_affected = \"libyaml on Ubuntu 13.10 ,\n Ubuntu 12.10 ,\n Ubuntu 12.04 LTS\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"USN\", value: \"2098-1\");\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-2098-1/\");\n script_summary(\"Check for the Version of libyaml\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-0-2\", ver:\"0.1.4-2ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-0-2:i386\", ver:\"0.1.4-2ubuntu0.13.10.1\", rls:\"UBUNTU13.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-0-2\", ver:\"0.1.4-2ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2020-03-17T23:00:33", "description": "The remote host is missing an update announced via the referenced Security Advisory.", "cvss3": {}, "published": "2015-09-08T00:00:00", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2014-324)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2020-03-13T00:00:00", "id": "OPENVAS:1361412562310120213", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120213", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120213\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:20:33 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2014-324)\");\n script_tag(name:\"insight\", value:\"The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.\");\n script_tag(name:\"solution\", value:\"Run yum update perl-YAML-LibYAML to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-324.html\");\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"perl-YAML-LibYAML-debuginfo\", rpm:\"perl-YAML-LibYAML-debuginfo~0.41~4.9.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-YAML-LibYAML\", rpm:\"perl-YAML-LibYAML~0.41~4.9.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:24", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-04-08T00:00:00", "type": "openvas", "title": "Ubuntu Update for libyaml-libyaml-perl USN-2161-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310841770", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841770", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2161_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for libyaml-libyaml-perl USN-2161-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841770\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-08 12:01:34 +0530 (Tue, 08 Apr 2014)\");\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Ubuntu Update for libyaml-libyaml-perl USN-2161-1\");\n\n script_tag(name:\"affected\", value:\"libyaml-libyaml-perl on Ubuntu 13.10,\n Ubuntu 12.10,\n Ubuntu 12.04 LTS\");\n script_tag(name:\"insight\", value:\"Florian Weimer discovered that libyaml-libyaml-perl incorrectly\nhandled certain large YAML documents. An attacker could use this issue to cause\nlibyaml-libyaml-perl to crash, resulting in a denial of service, or\npossibly execute arbitrary code. (CVE-2013-6393)\n\nIvan Fratric discovered that libyaml-libyaml-perl incorrectly handled\ncertain malformed YAML documents. An attacker could use this issue to cause\nlibyaml-libyaml-perl to crash, resulting in a denial of service, or\npossibly execute arbitrary code. (CVE-2014-2525)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2161-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2161-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libyaml-libyaml-perl'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(12\\.04 LTS|13\\.10|12\\.10)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.38-2ubuntu0.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.38-3ubuntu0.13.10.1\", rls:\"UBUNTU13.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.38-3ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-25T10:49:00", "description": "Check for the Version of perl-YAML-LibYAML", "cvss3": {}, "published": "2014-04-08T00:00:00", "type": "openvas", "title": "Fedora Update for perl-YAML-LibYAML FEDORA-2014-4517", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:867666", "href": "http://plugins.openvas.org/nasl.php?oid=867666", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-YAML-LibYAML FEDORA-2014-4517\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867666);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-08 11:12:49 +0530 (Tue, 08 Apr 2014)\");\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for perl-YAML-LibYAML FEDORA-2014-4517\");\n\n tag_insight = \"Kirill Siminov's 'libyaml' is arguably the best YAML implementation. The C\nlibrary is written precisely to the YAML 1.1 specification. It was originally\nbound to Python and was later bound to Ruby.\n\";\n\n tag_affected = \"perl-YAML-LibYAML on Fedora 19\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-4517\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131200.html\");\n script_summary(\"Check for the Version of perl-YAML-LibYAML\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-YAML-LibYAML\", rpm:\"perl-YAML-LibYAML~0.41~4.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-04T11:16:41", "description": "Check for the Version of libyaml-libyaml-perl", "cvss3": {}, "published": "2014-04-08T00:00:00", "type": "openvas", "title": "Ubuntu Update for libyaml-libyaml-perl USN-2161-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:841770", "href": "http://plugins.openvas.org/nasl.php?oid=841770", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2161_1.nasl 7957 2017-12-01 06:40:08Z santu $\n#\n# Ubuntu Update for libyaml-libyaml-perl USN-2161-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(841770);\n script_version(\"$Revision: 7957 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:40:08 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-08 12:01:34 +0530 (Tue, 08 Apr 2014)\");\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Ubuntu Update for libyaml-libyaml-perl USN-2161-1\");\n\n tag_insight = \"Florian Weimer discovered that libyaml-libyaml-perl incorrectly\nhandled certain large YAML documents. An attacker could use this issue to cause\nlibyaml-libyaml-perl to crash, resulting in a denial of service, or\npossibly execute arbitrary code. (CVE-2013-6393)\n\nIvan Fratric discovered that libyaml-libyaml-perl incorrectly handled\ncertain malformed YAML documents. An attacker could use this issue to cause\nlibyaml-libyaml-perl to crash, resulting in a denial of service, or\npossibly execute arbitrary code. (CVE-2014-2525)\";\n\n tag_affected = \"libyaml-libyaml-perl on Ubuntu 13.10 ,\n Ubuntu 12.10 ,\n Ubuntu 12.04 LTS\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"USN\", value: \"2161-1\");\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-2161-1/\");\n script_summary(\"Check for the Version of libyaml-libyaml-perl\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.38-2ubuntu0.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.38-3ubuntu0.13.10.1\", rls:\"UBUNTU13.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libyaml-libyaml-perl\", ver:\"0.38-3ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:48:46", "description": "Check for the Version of libyaml", "cvss3": {}, "published": "2014-04-08T00:00:00", "type": "openvas", "title": "Fedora Update for libyaml FEDORA-2014-4438", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:867658", "href": "http://plugins.openvas.org/nasl.php?oid=867658", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libyaml FEDORA-2014-4438\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867658);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-08 09:45:23 +0530 (Tue, 08 Apr 2014)\");\n script_cve_id(\"CVE-2014-2525\", \"CVE-2013-6393\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for libyaml FEDORA-2014-4438\");\n\n tag_insight = \"YAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and\nemitter written in C.\n\";\n\n tag_affected = \"libyaml on Fedora 19\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-4438\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131162.html\");\n script_summary(\"Check for the Version of libyaml\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"libyaml\", rpm:\"libyaml~0.1.6~1.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2020-01-27T18:36:06", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-01-23T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for libyaml (EulerOS-SA-2019-1445)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191445", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191445", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1445\");\n script_version(\"2020-01-23T11:47:28+0000\");\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:47:28 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:47:28 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for libyaml (EulerOS-SA-2019-1445)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-3\\.0\\.1\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1445\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1445\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'libyaml' package(s) announced via the EulerOS-SA-2019-1445 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.(CVE-2014-2525)\n\nThe yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.(CVE-2013-6393)\");\n\n script_tag(name:\"affected\", value:\"'libyaml' package(s) on Huawei EulerOS Virtualization 3.0.1.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-3.0.1.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"libyaml\", rpm:\"libyaml~0.1.4~11.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.1.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-25T10:48:27", "description": "Check for the Version of libyaml", "cvss3": {}, "published": "2014-04-08T00:00:00", "type": "openvas", "title": "Fedora Update for libyaml FEDORA-2014-4440", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:867660", "href": "http://plugins.openvas.org/nasl.php?oid=867660", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libyaml FEDORA-2014-4440\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867660);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-08 09:48:40 +0530 (Tue, 08 Apr 2014)\");\n script_cve_id(\"CVE-2014-2525\", \"CVE-2013-6393\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for libyaml FEDORA-2014-4440\");\n\n tag_insight = \"YAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and\nemitter written in C.\n\";\n\n tag_affected = \"libyaml on Fedora 20\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-4440\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131140.html\");\n script_summary(\"Check for the Version of libyaml\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"libyaml\", rpm:\"libyaml~0.1.6~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:48:17", "description": "Check for the Version of perl-YAML-LibYAML", "cvss3": {}, "published": "2014-04-08T00:00:00", "type": "openvas", "title": "Fedora Update for perl-YAML-LibYAML FEDORA-2014-4548", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:867664", "href": "http://plugins.openvas.org/nasl.php?oid=867664", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-YAML-LibYAML FEDORA-2014-4548\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867664);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-08 10:33:22 +0530 (Tue, 08 Apr 2014)\");\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for perl-YAML-LibYAML FEDORA-2014-4548\");\n\n tag_insight = \"Kirill Siminov's 'libyaml' is arguably the best YAML implementation. The C\nlibrary is written precisely to the YAML 1.1 specification. It was originally\nbound to Python and was later bound to Ruby.\n\";\n\n tag_affected = \"perl-YAML-LibYAML on Fedora 20\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-4548\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131190.html\");\n script_summary(\"Check for the Version of perl-YAML-LibYAML\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-YAML-LibYAML\", rpm:\"perl-YAML-LibYAML~0.41~4.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:37:22", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-04-08T00:00:00", "type": "openvas", "title": "Fedora Update for libyaml FEDORA-2014-4438", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310867658", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867658", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libyaml FEDORA-2014-4438\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867658\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-08 09:45:23 +0530 (Tue, 08 Apr 2014)\");\n script_cve_id(\"CVE-2014-2525\", \"CVE-2013-6393\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for libyaml FEDORA-2014-4438\");\n script_tag(name:\"affected\", value:\"libyaml on Fedora 19\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-4438\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131162.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libyaml'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC19\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"libyaml\", rpm:\"libyaml~0.1.6~1.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:28", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-04-08T00:00:00", "type": "openvas", "title": "Fedora Update for perl-YAML-LibYAML FEDORA-2014-4517", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310867666", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867666", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-YAML-LibYAML FEDORA-2014-4517\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867666\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-08 11:12:49 +0530 (Tue, 08 Apr 2014)\");\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for perl-YAML-LibYAML FEDORA-2014-4517\");\n script_tag(name:\"affected\", value:\"perl-YAML-LibYAML on Fedora 19\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-4517\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131200.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'perl-YAML-LibYAML'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC19\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-YAML-LibYAML\", rpm:\"perl-YAML-LibYAML~0.41~4.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:16", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-04-08T00:00:00", "type": "openvas", "title": "Fedora Update for libyaml FEDORA-2014-4440", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310867660", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867660", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libyaml FEDORA-2014-4440\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867660\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-08 09:48:40 +0530 (Tue, 08 Apr 2014)\");\n script_cve_id(\"CVE-2014-2525\", \"CVE-2013-6393\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for libyaml FEDORA-2014-4440\");\n script_tag(name:\"affected\", value:\"libyaml on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-4440\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131140.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libyaml'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"libyaml\", rpm:\"libyaml~0.1.6~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:37", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-04-08T00:00:00", "type": "openvas", "title": "Fedora Update for perl-YAML-LibYAML FEDORA-2014-4548", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310867664", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867664", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-YAML-LibYAML FEDORA-2014-4548\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867664\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-08 10:33:22 +0530 (Tue, 08 Apr 2014)\");\n script_cve_id(\"CVE-2013-6393\", \"CVE-2014-2525\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for perl-YAML-LibYAML FEDORA-2014-4548\");\n script_tag(name:\"affected\", value:\"perl-YAML-LibYAML on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-4548\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131190.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'perl-YAML-LibYAML'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-YAML-LibYAML\", rpm:\"perl-YAML-LibYAML~0.41~4.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:09", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2015-01-05T00:00:00", "type": "openvas", "title": "Fedora Update for perl-YAML-LibYAML FEDORA-2014-16143", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-9130", "CVE-2013-6393", "CVE-2014-2525"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310868863", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868863", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-YAML-LibYAML FEDORA-2014-16143\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868863\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-01-05 15:06:10 +0100 (Mon, 05 Jan 2015)\");\n script_cve_id(\"CVE-2014-9130\", \"CVE-2013-6393\", \"CVE-2014-2525\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for perl-YAML-LibYAML FEDORA-2014-16143\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'perl-YAML-LibYAML'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"perl-YAML-LibYAML on Fedora 21\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2014-16143\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-December/145949.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC21\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC21\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-YAML-LibYAML\", rpm:\"perl-YAML-LibYAML~0.54~1.fc21\", rls:\"FC21\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:46", "description": "Check the version of perl-YAML-LibYAML", "cvss3": {}, "published": "2014-12-14T00:00:00", "type": "openvas", "title": "Fedora Update for perl-YAML-LibYAML FEDORA-2014-16210", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-9130", "CVE-2013-6393", "CVE-2014-2525"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310868590", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868590", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-YAML-LibYAML FEDORA-2014-16210\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868590\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-12-14 06:03:40 +0100 (Sun, 14 Dec 2014)\");\n script_cve_id(\"CVE-2014-9130\", \"CVE-2013-6393\", \"CVE-2014-2525\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for perl-YAML-LibYAML FEDORA-2014-16210\");\n script_tag(name:\"summary\", value:\"Check the version of perl-YAML-LibYAML\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"perl-YAML-LibYAML on Fedora 19\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2014-16210\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-December/145996.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC19\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-YAML-LibYAML\", rpm:\"perl-YAML-LibYAML~0.54~1.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:39", "description": "Check the version of perl-YAML-LibYAML", "cvss3": {}, "published": "2014-12-14T00:00:00", "type": "openvas", "title": "Fedora Update for perl-YAML-LibYAML FEDORA-2014-16266", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-9130", "CVE-2013-6393", "CVE-2014-2525"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310868593", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868593", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-YAML-LibYAML FEDORA-2014-16266\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868593\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-12-14 06:03:54 +0100 (Sun, 14 Dec 2014)\");\n script_cve_id(\"CVE-2014-9130\", \"CVE-2013-6393\", \"CVE-2014-2525\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for perl-YAML-LibYAML FEDORA-2014-16266\");\n script_tag(name:\"summary\", value:\"Check the version of perl-YAML-LibYAML\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"perl-YAML-LibYAML on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2014-16266\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-December/146122.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-YAML-LibYAML\", rpm:\"perl-YAML-LibYAML~0.54~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:36", "description": "Check the version of libyaml", "cvss3": {}, "published": "2014-12-14T00:00:00", "type": "openvas", "title": "Fedora Update for libyaml FEDORA-2014-16132", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-9130", "CVE-2013-6393", "CVE-2014-2525"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310868591", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868591", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libyaml FEDORA-2014-16132\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868591\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-12-14 06:03:45 +0100 (Sun, 14 Dec 2014)\");\n script_cve_id(\"CVE-2014-9130\", \"CVE-2014-2525\", \"CVE-2013-6393\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for libyaml FEDORA-2014-16132\");\n script_tag(name:\"summary\", value:\"Check the version of libyaml\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"libyaml on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2014-16132\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-December/146130.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"libyaml\", rpm:\"libyaml~0.1.6~2.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:38", "description": "Check the version of libyaml", "cvss3": {}, "published": "2014-12-14T00:00:00", "type": "openvas", "title": "Fedora Update for libyaml FEDORA-2014-16130", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-9130", "CVE-2013-6393", "CVE-2014-2525"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310868586", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868586", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libyaml FEDORA-2014-16130\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868586\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-12-14 06:02:59 +0100 (Sun, 14 Dec 2014)\");\n script_cve_id(\"CVE-2014-9130\", \"CVE-2014-2525\", \"CVE-2013-6393\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for libyaml FEDORA-2014-16130\");\n script_tag(name:\"summary\", value:\"Check the version of libyaml\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"libyaml on Fedora 19\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2014-16130\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-December/146084.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC19\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"libyaml\", rpm:\"libyaml~0.1.6~2.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:34:56", "description": "This host is running Apple Mac OS X and\n is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2016-11-17T00:00:00", "type": "openvas", "title": "Apple Mac OS X Multiple Vulnerabilities-02 November-2016", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-1318", "CVE-2014-1316", "CVE-2014-1319", "CVE-2014-1322", "CVE-2014-1296", "CVE-2014-1320", "CVE-2014-1295", "CVE-2013-6393", "CVE-2014-1321", "CVE-2014-1315", "CVE-2014-1314", "CVE-2013-4164"], "modified": "2019-03-19T00:00:00", "id": "OPENVAS:1361412562310810220", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810220", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_apple_macosx_mult_vuln02_nov16.nasl 14304 2019-03-19 09:10:40Z cfischer $\n#\n# Apple Mac OS X Multiple Vulnerabilities-02 November-2016\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.810220\");\n script_version(\"$Revision: 14304 $\");\n script_cve_id(\"CVE-2014-1314\", \"CVE-2014-1315\", \"CVE-2014-1316\", \"CVE-2014-1318\",\n \"CVE-2014-1319\", \"CVE-2014-1321\", \"CVE-2014-1322\", \"CVE-2014-1296\",\n \"CVE-2014-1320\", \"CVE-2013-6393\", \"CVE-2013-4164\", \"CVE-2014-1295\");\n script_bugtraq_id(63873, 67030, 67029, 67029, 67028, 67023, 67024, 67027, 65258, 63873, 67025);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 10:10:40 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-11-17 22:43:28 -0800 (Thu, 17 Nov 2016)\");\n script_name(\"Apple Mac OS X Multiple Vulnerabilities-02 November-2016\");\n\n script_tag(name:\"summary\", value:\"This host is running Apple Mac OS X and\n is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - The windowServer does not prevent session creation by a sandboxed\n application.\n\n - A format string error in CoreServicesUIAgent.\n\n - The Intel Graphics Driver does not properly validate a certain pointer.\n\n - A buffer overflow error in ImageIO.\n\n - An improper implementation of power management.\n\n - The kernel places a kernel pointer into an XNU object data structure\n accessible from user space.\n\n - An error in Heimdal Kerberos.\n\n - An error in CFNetwork HTTPProtocol.\n\n - An error in IOKit Kernel.\n\n - An integer overflow issue existed in LibYAML's handling of YAML tags.\n\n - A heap-based buffer overflow issue error in Ruby.\n\n - An error in secure transport regarding renegotiation.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attacker\n to execute arbitrary code or cause a denial of service (memory corruption), to\n gain sensitive information and to bypass certain protection mechanism and\n have other impacts.\");\n\n script_tag(name:\"affected\", value:\"Apple Mac OS X versions 10.9.x through\n 10.9.2\");\n\n script_tag(name:\"solution\", value:\"Updates are available.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://support.apple.com/en-us/HT202966\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Mac OS X Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/osx_name\", \"ssh/login/osx_version\", re:\"ssh/login/osx_version=^10\\.9.\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\n\nosName = get_kb_item(\"ssh/login/osx_name\");\nif(!osName)\n exit(0);\n\nosVer = get_kb_item(\"ssh/login/osx_version\");\nif(!osVer)\n exit(0);\n\nif(\"Mac OS X\" >< osName && osVer =~ \"^10\\.9\")\n{\n if(version_in_range(version:osVer, test_version:\"10.9.0\", test_version2:\"10.9.1\")){\n fix = \"Upgrade to latest OS release 10.9.2 and apply patch from vendor\" ;\n }\n\n else if(osVer == \"10.9.2\")\n {\n buildVer = get_kb_item(\"ssh/login/osx_build\");\n if(!buildVer){\n exit(0);\n }\n\n if(version_is_less(version:buildVer, test_version:\"13C1021\"))\n {\n fix = \"Apply patch from vendor\";\n osVer = osVer + \" Build \" + buildVer;\n }\n }\n}\n\nif(fix)\n{\n report = report_fixed_ver(installed_version:osVer, fixed_version:fix);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:25:33", "description": "This host is installed with Apple OS X Server\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2016-12-05T00:00:00", "type": "openvas", "title": "Apple OS X Server Multiple Vulnerabilities Dec16", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-3566", "CVE-2014-4424", "CVE-2014-4406", "CVE-2013-3919", "CVE-2014-0065", "CVE-2014-0064", "CVE-2014-0591", "CVE-2014-0063", "CVE-2013-6393", "CVE-2014-0060", "CVE-2014-0062", "CVE-2014-4446", "CVE-2013-4854", "CVE-2014-0066", "CVE-2013-4164", "CVE-2014-4447", "CVE-2014-0061"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310810232", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810232", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Apple OS X Server Multiple Vulnerabilities Dec16\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/o:apple:os_x_server\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.810232\");\n script_version(\"2019-07-05T09:12:25+0000\");\n script_cve_id(\"CVE-2013-3919\", \"CVE-2013-4854\", \"CVE-2014-0591\", \"CVE-2014-4424\",\n \"CVE-2014-4406\", \"CVE-2014-0060\", \"CVE-2014-0061\", \"CVE-2014-0062\",\n \"CVE-2014-0063\", \"CVE-2014-0064\", \"CVE-2014-0065\", \"CVE-2014-0066\",\n \"CVE-2014-4446\", \"CVE-2013-4164\", \"CVE-2013-6393\", \"CVE-2014-4447\",\n \"CVE-2014-3566\");\n script_bugtraq_id(90690, 90689);\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 09:12:25 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-12-05 14:52:33 +0530 (Mon, 05 Dec 2016)\");\n script_name(\"Apple OS X Server Multiple Vulnerabilities Dec16\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Apple OS X Server\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - An integer overflow issue existed in LibYAML's handling of YAML tags.\n\n - The SSL protocol 3.0 uses nondeterministic CBC padding.\n\n - An improper handling of credentials in Profile Manager.\n\n - The multiple errors in LibYAML.\n\n - The SACL settings for Mail were cached and changes to the SACLs were not respected\n until after a restart of the Mail service.\n\n - The multiple errors in PostgreSQL.\n\n - A cross-site scripting error existed in Xcode Server.\n\n - A SQL injection issue existed in Wiki Server.\n\n - The multiple errors in BIND.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to obtain sensitive information, execute arbitrary commands and cause a denial of\n service condition.\");\n\n script_tag(name:\"affected\", value:\"Apple OS X Server before 4.0\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Apple OS X Server 4.0 or\n later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.apple.com/en-us/HT203111\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_apple_macosx_server_detect.nasl\");\n script_mandatory_keys(\"Apple/OSX/Server/Version\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!serVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:serVer, test_version:\"4.0\"))\n{\n report = report_fixed_ver(installed_version:serVer, fixed_version:\"4.0\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "gentoo": [{"lastseen": "2022-01-17T19:09:05", "description": "### Background\n\nLibYAML is a YAML 1.1 parser and emitter written in C.\n\n### Description\n\nA heap-based buffer overflow flaw was found in the way libyaml parsed YAML tags. \n\n### Impact\n\nA remote attacker could provide a specially-crafted YAML document which when parsed by LibYAML, would cause the application to crash or, potentially, execute arbitrary code with the privileges the user who is running the application. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll LibYAML users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-libs/libyaml-0.1.5\"", "cvss3": {}, "published": "2014-03-08T00:00:00", "type": "gentoo", "title": "LibYAML: Arbitrary code execution", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-03-08T00:00:00", "id": "GLSA-201403-02", "href": "https://security.gentoo.org/glsa/201403-02", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2021-12-08T00:34:55", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2870-1 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nMarch 08, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : libyaml-libyaml-perl\nVulnerability : heap-based buffer overflow\nCVE ID : CVE-2013-6393\n\nFlorian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.\n\nThis update corrects this flaw in the copy that is embedded in the\nlibyaml-libyaml-perl package.\n\nFor the oldstable distribution (squeeze), this problem has been fixed in\nversion 0.33-1+squeeze2.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.38-3+deb7u1.\n\nFor the testing distribution (jessie), this problem has been fixed in\nversion 0.41-4.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 0.41-4.\n\nWe recommend that you upgrade your libyaml-libyaml-perl packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2014-03-08T12:52:12", "type": "debian", "title": "[SECURITY] [DSA 2870-1] libyaml-libyaml-perl security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-03-08T12:52:12", "id": "DEBIAN:DSA-2870-1:028CC", "href": "https://lists.debian.org/debian-security-announce/2014/msg00041.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-21T23:22:39", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2870-1 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nMarch 08, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : libyaml-libyaml-perl\nVulnerability : heap-based buffer overflow\nCVE ID : CVE-2013-6393\n\nFlorian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.\n\nThis update corrects this flaw in the copy that is embedded in the\nlibyaml-libyaml-perl package.\n\nFor the oldstable distribution (squeeze), this problem has been fixed in\nversion 0.33-1+squeeze2.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.38-3+deb7u1.\n\nFor the testing distribution (jessie), this problem has been fixed in\nversion 0.41-4.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 0.41-4.\n\nWe recommend that you upgrade your libyaml-libyaml-perl packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2014-03-08T12:52:12", "type": "debian", "title": "[SECURITY] [DSA 2870-1] libyaml-libyaml-perl security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-03-08T12:52:12", "id": "DEBIAN:DSA-2870-1:59613", "href": "https://lists.debian.org/debian-security-announce/2014/msg00041.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-21T23:23:33", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2850-1 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nJanuary 31, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : libyaml\nVulnerability : heap-based buffer overflow\nProblem type : local (remote)\nDebian-specific: no\nCVE ID : CVE-2013-6393\nDebian Bug : 737076\n\nFlorian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.\n\nFor the oldstable distribution (squeeze), this problem has been fixed in\nversion 0.1.3-1+deb6u2.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.1.4-2+deb7u2.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 0.1.4-3.\n\nWe recommend that you upgrade your libyaml packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2014-01-31T21:25:45", "type": "debian", "title": "[SECURITY] [DSA 2850-1] libyaml security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-01-31T21:25:45", "id": "DEBIAN:DSA-2850-1:BC24E", "href": "https://lists.debian.org/debian-security-announce/2014/msg00020.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-08T00:35:10", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2850-1 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nJanuary 31, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : libyaml\nVulnerability : heap-based buffer overflow\nProblem type : local (remote)\nDebian-specific: no\nCVE ID : CVE-2013-6393\nDebian Bug : 737076\n\nFlorian Weimer of the Red Hat Product Security Team discovered a\nheap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and\nemitter library. A remote attacker could provide a YAML document with a\nspecially-crafted tag that, when parsed by an application using libyaml,\nwould cause the application to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the application.\n\nFor the oldstable distribution (squeeze), this problem has been fixed in\nversion 0.1.3-1+deb6u2.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.1.4-2+deb7u2.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 0.1.4-3.\n\nWe recommend that you upgrade your libyaml packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2014-01-31T21:25:45", "type": "debian", "title": "[SECURITY] [DSA 2850-1] libyaml security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-01-31T21:25:45", "id": "DEBIAN:DSA-2850-1:AB457", "href": "https://lists.debian.org/debian-security-announce/2014/msg00020.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "amazon": [{"lastseen": "2021-07-25T19:32:08", "description": "**Issue Overview:**\n\nThe yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.\n\n \n**Affected Packages:** \n\n\nlibyaml\n\n \n**Issue Correction:** \nRun _yum update libyaml_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n \u00a0\u00a0\u00a0 libyaml-devel-0.1.4-6.5.amzn1.i686 \n \u00a0\u00a0\u00a0 libyaml-debuginfo-0.1.4-6.5.amzn1.i686 \n \u00a0\u00a0\u00a0 libyaml-0.1.4-6.5.amzn1.i686 \n \n src: \n \u00a0\u00a0\u00a0 libyaml-0.1.4-6.5.amzn1.src \n \n x86_64: \n \u00a0\u00a0\u00a0 libyaml-debuginfo-0.1.4-6.5.amzn1.x86_64 \n \u00a0\u00a0\u00a0 libyaml-0.1.4-6.5.amzn1.x86_64 \n \u00a0\u00a0\u00a0 libyaml-devel-0.1.4-6.5.amzn1.x86_64 \n \n \n", "edition": 2, "cvss3": {}, "published": "2014-02-26T14:27:00", "type": "amazon", "title": "Important: libyaml", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-09-16T22:32:00", "id": "ALAS-2014-291", "href": "https://alas.aws.amazon.com/ALAS-2014-291.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-07-25T19:31:50", "description": "**Issue Overview:**\n\nThe yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.\n\nHeap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.\n\n \n**Affected Packages:** \n\n\nperl-YAML-LibYAML\n\n \n**Issue Correction:** \nRun _yum update perl-YAML-LibYAML_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n \u00a0\u00a0\u00a0 perl-YAML-LibYAML-debuginfo-0.41-4.9.amzn1.i686 \n \u00a0\u00a0\u00a0 perl-YAML-LibYAML-0.41-4.9.amzn1.i686 \n \n src: \n \u00a0\u00a0\u00a0 perl-YAML-LibYAML-0.41-4.9.amzn1.src \n \n x86_64: \n \u00a0\u00a0\u00a0 perl-YAML-LibYAML-debuginfo-0.41-4.9.amzn1.x86_64 \n \u00a0\u00a0\u00a0 perl-YAML-LibYAML-0.41-4.9.amzn1.x86_64 \n \n \n", "edition": 2, "cvss3": {}, "published": "2014-04-17T14:18:00", "type": "amazon", "title": "Important: perl-YAML-LibYAML", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2014-09-18T00:20:00", "id": "ALAS-2014-324", "href": "https://alas.aws.amazon.com/ALAS-2014-324.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2022-01-19T15:51:32", "description": "\n\nlibyaml was prone to a heap overflow that could result in\n\t arbitrary code execution. Pkg uses libyaml to parse\n\t the package manifests in some cases. Pkg also used libyaml\n\t to parse the remote repository until 1.2.\nRedHat Product Security Team reports on libyaml:\n\nA heap-based buffer overflow flaw was found in the way libyaml\n\t parsed YAML tags. A remote attacker could provide a\n\t specially-crafted YAML document that, when parsed by an application\n\t using libyaml, would cause the application to crash or, potentially,\n\t execute arbitrary code with the privileges of the user running the\n\t application.\n\n\n", "cvss3": {}, "published": "2013-11-24T00:00:00", "type": "freebsd", "title": "libyaml heap overflow resulting in possible code execution", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-02-01T00:00:00", "id": "111F1F84-1D14-4FF2-A9EA-CF07119C0D3B", "href": "https://vuxml.freebsd.org/freebsd/111f1f84-1d14-4ff2-a9ea-cf07119c0d3b.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:50", "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2098-1\r\nFebruary 04, 2014\r\n\r\nlibyaml vulnerability\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 13.10\r\n- Ubuntu 12.10\r\n- Ubuntu 12.04 LTS\r\n\r\nSummary:\r\n\r\nLibYAML could be made to crash or run programs if it opened specially\r\ncrafted yaml document.\r\n\r\nSoftware Description:\r\n- libyaml: Fast YAML 1.1 parser and emitter library\r\n\r\nDetails:\r\n\r\nFlorian Weimer discovered that LibYAML incorrectly handled certain large\r\nyaml documents. An attacker could use this issue to cause LibYAML to crash,\r\nresulting in a denial of service, or possibly execute arbitrary code.\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 13.10:\r\n libyaml-0-2 0.1.4-2ubuntu0.13.10.1\r\n\r\nUbuntu 12.10:\r\n libyaml-0-2 0.1.4-2ubuntu0.12.10.1\r\n\r\nUbuntu 12.04 LTS:\r\n libyaml-0-2 0.1.4-2ubuntu0.12.04.1\r\n\r\nAfter a standard system update you need to restart applications using\r\nLibYAML to make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2098-1\r\n CVE-2013-6393\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/libyaml/0.1.4-2ubuntu0.13.10.1\r\n https://launchpad.net/ubuntu/+source/libyaml/0.1.4-2ubuntu0.12.10.1\r\n https://launchpad.net/ubuntu/+source/libyaml/0.1.4-2ubuntu0.12.04.1\r\n\r\n\r\n\r\n\r\n-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n", "edition": 1, "cvss3": {}, "published": "2014-02-10T00:00:00", "title": "[USN-2098-1] LibYAML vulnerability", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2013-6393"], "modified": "2014-02-10T00:00:00", "id": "SECURITYVULNS:DOC:30299", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30299", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2021-06-08T19:01:58", "description": "Buffer oveflow on oversized tag.", "edition": 2, "cvss3": {}, "published": "2014-03-31T00:00:00", "title": "libYAML buffer overflow", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2014-03-31T00:00:00", "id": "SECURITYVULNS:VULN:13563", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13563", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:52", "description": "\r\n\r\nHi all,\r\n\r\nThis is a request for CVEs for the following vulnerabilities discovered\r\nby the Node Security Project. I left out their advisories where I could\r\nfind an assigned CVE;\r\n\r\nCVE-2013-7370 CVE-2013-7371 CVE-2013-6393 CVE-2013-4660\r\n\r\nhttps://nodesecurity.io/advisories\r\n\r\nprinter potential command injection on untrusted input\r\nhttps://nodesecurity.io/advisories/printer_potential_command_injection\r\nhapi file descriptor leak can cause DoS vulnerability\r\nhttps://nodesecurity.io/advisories/hapi_File_descriptor_leak_DoS_vulnerability\r\n\r\nmarked multiple content injection vulnerabilities\r\nhttps://nodesecurity.io/advisories/marked_multiple_content_injection_vulnerabilities\r\n\r\nst directory traversal\r\nhttps://nodesecurity.io/advisories/st_directory_traversal\r\n\r\ncodem-transcode potential command injection in ffprobe functionality\r\nhttps://nodesecurity.io/advisories/codem-transcode_command_injection\r\nHubot Scripts Potential command injection in email.coffee\r\nhttps://nodesecurity.io/advisories/Hubot_Potential_command_injection_in_email.coffee\r\n\r\nTomato API Admin Auth Weakness\r\nhttps://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness\r\n\r\nep_imageconvert unauthenticated remote command injection\r\nhttps://nodesecurity.io/advisories/ep_imageconvert_command_injection\r\n\r\npotential command injection in libnotify.notify\r\nhttps://nodesecurity.io/advisories/libnotify_potential_command_injection_in_libnotify.notify\r\n\r\n-- bye, pabs http://bonedaddy.net/pabs3/\r\n\r\n", "edition": 1, "cvss3": {}, "published": "2014-05-15T00:00:00", "title": "[oss-security] CVE request: various NodeJS module vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2013-7371", "CVE-2013-6393", "CVE-2013-7370", "CVE-2013-4660"], "modified": "2014-05-15T00:00:00", "id": "SECURITYVULNS:DOC:30743", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30743", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:51", "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nAPPLE-SA-2014-04-22-1 Security Update 2014-002\r\n\r\nSecurity Update 2014-002 is now available and addresses the\r\nfollowing:\r\n\r\nCFNetwork HTTPProtocol\r\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2\r\nImpact: An attacker in a privileged network position can obtain web\r\nsite credentials\r\nDescription: Set-Cookie HTTP headers would be processed even if the\r\nconnection closed before the header line was complete. An attacker\r\ncould strip security settings from the cookie by forcing the\r\nconnection to close before the security settings were sent, and then\r\nobtain the value of the unprotected cookie. This issue was addressed\r\nby ignoring incomplete HTTP header lines.\r\nCVE-ID\r\nCVE-2014-1296 : Antoine Delignat-Lavaud of Prosecco at Inria Paris\r\n\r\nCoreServicesUIAgent\r\nAvailable for: OS X Mavericks v10.9.2\r\nImpact: Visiting a maliciously crafted website or URL may result in\r\nan unexpected application termination or arbitrary code execution\r\nDescription: A format string issue existed in the handling of URLs.\r\nThis issue was addressed through additional validation of URLs. This\r\nissue does not affect systems prior to OS X Mavericks.\r\nCVE-ID\r\nCVE-2014-1315 : Lukasz Pilorz of runic.pl, Erik Kooistra\r\n\r\nFontParser\r\nAvailable for: OS X Mountain Lion v10.8.5\r\nImpact: Opening a maliciously crafted PDF file may result in an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A buffer underflow existed in the handling of fonts in\r\nPDF files. This issue was addressed through additional bounds\r\nchecking. This issue does not affect OS X Mavericks systems.\r\nCVE-ID\r\nCVE-2013-5170 : Will Dormann of CERT/CC\r\n\r\nHeimdal Kerberos\r\nAvailable for: OS X Mavericks v10.9.2\r\nImpact: A remote attacker may be able to cause a denial of service\r\nDescription: A reachable abort existed in the handling of ASN.1\r\ndata. This issue was addressed through additional validation of ASN.1\r\ndata.\r\nCVE-ID\r\nCVE-2014-1316 : Joonas Kuorilehto of Codenomicon\r\n\r\nImageIO\r\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2\r\nImpact: Viewing a maliciously crafted JPEG image may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A buffer overflow issue existed in ImageIO's handling\r\nof JPEG images. This issue was addressed through improved bounds\r\nchecking. This issue does not affect systems prior to OS X Mavericks.\r\nCVE-ID\r\nCVE-2014-1319 : Cristian Draghici of Modulo Consulting, Karl Smith of\r\nNCC Group\r\n\r\nIntel Graphics Driver\r\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2\r\nImpact: A malicious application can take control of the system\r\nDescription: A validation issue existed in the handling of a pointer\r\nfrom userspace. This issue was addressed through additional\r\nvalidation of pointers.\r\nCVE-ID\r\nCVE-2014-1318 : Ian Beer of Google Project Zero working with HP's\r\nZero Day Initiative\r\n\r\nIOKit Kernel\r\nAvailable for: OS X Mavericks v10.9.2\r\nImpact: A local user can read kernel pointers, which can be used to\r\nbypass kernel address space layout randomization\r\nDescription: A set of kernel pointers stored in an IOKit object\r\ncould be retrieved from userland. This issue was addressed through\r\nremoving the pointers from the object.\r\nCVE-ID\r\nCVE-2014-1320 : Ian Beer of Google Project Zero working with HP's\r\nZero Day Initiative\r\n\r\nKernel\r\nAvailable for: OS X Mavericks v10.9.2\r\nImpact: A local user can read a kernel pointer, which can be used to\r\nbypass kernel address space layout randomization\r\nDescription: A kernel pointer stored in a XNU object could be\r\nretrieved from userland. This issue was addressed through removing\r\nthe pointer from the object.\r\nCVE-ID\r\nCVE-2014-1322 : Ian Beer of Google Project Zero\r\n\r\nPower Management\r\nAvailable for: OS X Mavericks v10.9.2\r\nImpact: The screen might not lock\r\nDescription: If a key was pressed or the trackpad touched just after\r\nthe lid was closed, the system might have tried to wake up while\r\ngoing to sleep, which would have caused the screen to be unlocked.\r\nThis issue was addressed by ignoring keypresses while going to sleep.\r\nThis issue does not affect systems prior to OS X Mavericks.\r\nCVE-ID\r\nCVE-2014-1321 : Paul Kleeberg of Stratis Health Bloomington MN,\r\nJulian Sincu at the Baden-Wuerttemberg Cooperative State University\r\n(DHBW Stuttgart), Gerben Wierda of R&A, Daniel Luz\r\n\r\nRuby\r\nAvailable for: OS X Mavericks v10.9.2\r\nImpact: Running a Ruby script that handles untrusted YAML tags may\r\nlead to an unexpected application termination or arbitrary code\r\nexecution\r\nDescription: An integer overflow issue existed in LibYAML's handling\r\nof YAML tags. This issue was addressed through additional validation\r\nof YAML tags. This issue does not affect systems prior to OS X\r\nMavericks.\r\nCVE-ID\r\nCVE-2013-6393\r\n\r\nRuby\r\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2\r\nImpact: Running a Ruby script that uses untrusted input to create a\r\nFloat object may lead to an unexpected application termination or\r\narbitrary code execution\r\nDescription: A heap-based buffer overflow issue existed in Ruby when\r\nconverting a string to a floating point value. This issue was\r\naddressed through additional validation of floating point values.\r\nCVE-ID\r\nCVE-2013-4164\r\n\r\nSecurity - Secure Transport\r\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2\r\nImpact: An attacker with a privileged network position may capture\r\ndata or change the operations performed in sessions protected by SSL\r\nDescription: In a 'triple handshake' attack, it was possible for an\r\nattacker to establish two connections which had the same encryption\r\nkeys and handshake, insert the attacker's data in one connection, and\r\nrenegotiate so that the connections may be forwarded to each other.\r\nTo prevent attacks based on this scenario, Secure Transport was\r\nchanged so that, by default, a renegotiation must present the same\r\nserver certificate as was presented in the original connection. This\r\nissue does not affect Mac OS X 10.7 systems and earlier.\r\nCVE-ID\r\nCVE-2014-1295 : Antoine Delignat-Lavaud, Karthikeyan Bhargavan and\r\nAlfredo Pironti of Prosecco at Inria Paris\r\n\r\nWindowServer\r\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2\r\nImpact: Maliciously crafted applications can execute arbitrary code\r\noutside the sandbox\r\nDescription: WindowServer sessions could be created by sandboxed\r\napplications. This issue was addressed by disallowing sandboxed\r\napplications from creating WindowServer sessions.\r\nCVE-ID\r\nCVE-2014-1314 : KeenTeam working with HP's Zero Day Initiative\r\n\r\nNote: Security Update 2014-002 for OS X Mavericks systems includes\r\nthe security content of Safari 7.0.3:\r\nhttp://support.apple.com/kb/HT6181\r\n\r\nSecurity Update 2014-002 may be obtained via the Apple Software\r\nUpdate application, and from the Apple's Software Downloads web\r\nsite: http://www.apple.com/support/downloads/\r\n\r\nInformation will also be posted to the Apple Security Updates\r\nweb site: http://support.apple.com/kb/HT1222\r\n\r\nThis message is signed with Apple's Product Security PGP key,\r\nand details are available at:\r\nhttps://www.apple.com/support/security/pgp/\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG/MacGPG2 v2.0.22 (Darwin)\r\nComment: GPGTools - http://gpgtools.org\r\n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\r\n7hmpILk22+6xv6pWCw8D\r\n=WWPv\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "cvss3": {}, "published": "2014-05-04T00:00:00", "title": "APPLE-SA-2014-04-22-1 Security Update 2014-002", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-1318", "CVE-2014-1316", "CVE-2014-1319", "CVE-2014-1322", "CVE-2014-1296", "CVE-2014-1320", "CVE-2013-5170", "CVE-2014-1295", "CVE-2013-6393", "CVE-2014-1321", "CVE-2014-1315", "CVE-2014-1314", "CVE-2013-4164"], "modified": "2014-05-04T00:00:00", "id": "SECURITYVULNS:DOC:30550", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30550", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2021-06-08T19:03:06", "description": "Information disclosures, memory corruptions, DoS, privilege escalations, protection bypass.", "edition": 2, "cvss3": {}, "published": "2014-05-30T00:00:00", "title": "Apple Mac OS X multiple security vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-1318", "CVE-2014-1316", "CVE-2014-1319", "CVE-2014-1322", "CVE-2014-1296", "CVE-2014-1320", "CVE-2013-5170", "CVE-2014-1295", "CVE-2013-6393", "CVE-2014-1321", "CVE-2014-1315", "CVE-2014-1314", "CVE-2013-4164"], "modified": "2014-05-30T00:00:00", "id": "SECURITYVULNS:VULN:13795", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13795", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2021-06-08T19:03:05", "description": "Unsafe cookie handling, code execution via different formats and protocols, privilege escalation, information leakage.", "edition": 2, "cvss3": {}, "published": "2015-04-09T00:00:00", "title": "Apple Mac OS X multiple security vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-1318", "CVE-2014-1316", "CVE-2014-1319", "CVE-2014-1322", "CVE-2014-1296", "CVE-2014-1320", "CVE-2013-5170", "CVE-2014-1295", "CVE-2013-6393", "CVE-2014-1321", "CVE-2014-1315", "CVE-2014-1314", "CVE-2013-4164"], "modified": "2015-04-09T00:00:00", "id": "SECURITYVULNS:VULN:13711", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13711", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:54", "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nAPPLE-SA-2014-10-16-3 OS X Server v4.0\r\n\r\nOS X Server v4.0 is now available and addresses the following:\r\n\r\nBIND\r\nAvailable for: OS X Yosemite v10.10 or later\r\nImpact: Multiple vulnerabilities in BIND, the most serious of which\r\nmay lead to a denial of service\r\nDescription: Multiple vulnerabilities existed in BIND. These issues\r\nwere addressed by updating BIND to version 9.9.2-P2\r\nCVE-ID\r\nCVE-2013-3919\r\nCVE-2013-4854\r\nCVE-2014-0591\r\n\r\nCoreCollaboration\r\nAvailable for: OS X Yosemite v10.10 or later\r\nImpact: A remote attacker may be able to execute arbitrary SQL\r\nqueries\r\nDescription: A SQL injection issue existed in Wiki Server. This\r\nissue was addressed through additional validation of SQL queries.\r\nCVE-ID\r\nCVE-2014-4424 : Sajjad Pourali (sajjad@securation.com) of CERT of\r\nFerdowsi University of Mashhad\r\n\r\nCoreCollaboration\r\nAvailable for: OS X Yosemite v10.10 or later\r\nImpact: Visiting a maliciously crafted website may lead to a cross-\r\nsite scripting attack\r\nDescription: A cross-site scripting issue existed in Xcode Server.\r\nThis issue was addressed through improved encoding of HTML output.\r\nCVE-ID\r\nCVE-2014-4406 : David Hoyt of Hoyt LLC\r\n\r\nCoreCollaboration\r\nAvailable for: OS X Yosemite v10.10 or later\r\nImpact: Multiple vulnerabilities in PostgreSQL, the most serious of\r\nwhich may lead to arbitrary code execution\r\nDescription: Multiple vulnerabilities existed in PostgreSQL. These\r\nissues were addressed by updating PostgreSQL to version 9.2.7.\r\nCVE-ID\r\nCVE-2014-0060\r\nCVE-2014-0061\r\nCVE-2014-0062\r\nCVE-2014-0063\r\nCVE-2014-0064\r\nCVE-2014-0065\r\nCVE-2014-0066\r\n\r\nMail Service\r\nAvailable for: OS X Yosemite v10.10 or later\r\nImpact: Group SACL changes for Mail may not be respected until after\r\na restart of the Mail service\r\nDescription: SACL settings for Mail were cached and changes to the\r\nSACLs were not respected until after a restart of the Mail service.\r\nThis issue was addressed by resetting the cache upon changes to the\r\nSACLs.\r\nCVE-ID\r\nCVE-2014-4446 : Craig Courtney\r\n\r\nProfile Manager\r\nAvailable for: OS X Yosemite v10.10 or later\r\nImpact: Multiple vulnerabilities in LibYAML, the most serious of\r\nwhich may lead to arbitrary code execution\r\nDescription: Multiple vulnerabilities existed in LibYAML. These\r\nissues were addressed by switching from YAML to JSON as Profile\r\nManager's internal serialization format.\r\nCVE-ID\r\nCVE-2013-4164\r\nCVE-2013-6393\r\n\r\nProfile Manager\r\nAvailable for: OS X Yosemite v10.10 or later\r\nImpact: A local user may obtain passwords after setting up or\r\nediting profiles in Profile Manager\r\nDescription: In certain circumstances, setting up or editing\r\nprofiles in Profile Manager may have logged passwords to a file. This\r\nissue was addressed through improved handling of credentials.\r\nCVE-ID\r\nCVE-2014-4447 : Mayo Jordanov\r\n\r\nServer\r\nAvailable for: OS X Yosemite v10.10 or later\r\nImpact: An attacker may be able to decrypt data protected by SSL\r\nDescription: There are known attacks on the confidentiality of SSL\r\n3.0 when a cipher suite uses a block cipher in CBC mode. An attacker\r\ncould force the use of SSL 3.0, even when the server would support a\r\nbetter TLS version, by blocking TLS 1.0 and higher connection\r\nattempts. This issue was addressed by disabling SSL 3.0 support in\r\nWeb Server, Calendar & Contacts Server, and Remote Administration.\r\nCVE-ID\r\nCVE-2014-3566 : Bodo Moeller, Thai Duong, and Krzysztof Kotowicz of\r\nGoogle Security Team\r\n\r\nServerRuby\r\nAvailable for: OS X Yosemite v10.10 or later\r\nImpact: Running a Ruby script that handles untrusted YAML tags may\r\nlead to an unexpected application termination or arbitrary code\r\nexecution\r\nDescription: An integer overflow issue existed in LibYAML's handling\r\nof YAML tags. This issue was addressed through additional validation\r\nof YAML tags. This issue does not affect systems prior to OS X\r\nMavericks.\r\nCVE-ID\r\nCVE-2013-6393\r\n\r\n\r\nOS X Server v4.0 may be obtained from the Mac App Store.\r\n\r\nInformation will also be posted to the Apple Security Updates\r\nweb site: http://support.apple.com/kb/HT1222\r\n\r\nThis message is signed with Apple's Product Security PGP key,\r\nand details are available at:\r\nhttps://www.apple.com/support/security/pgp/\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG/MacGPG2 v2.0.22 (Darwin)\r\nComment: GPGTools - http://gpgtools.org\r\n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\r\nfIWnhQEvESJVqfrk3Q3X\r\n=LbVb\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "cvss3": {}, "published": "2014-10-18T00:00:00", "title": "APPLE-SA-2014-10-16-3 OS X Server v4.0", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-3566", "CVE-2014-4424", "CVE-2014-4406", "CVE-2013-3919", "CVE-2014-0065", "CVE-2014-0064", "CVE-2014-0591", "CVE-2014-0063", "CVE-2013-6393", "CVE-2014-0060", "CVE-2014-0062", "CVE-2014-4446", "CVE-2013-4854", "CVE-2014-0066", "CVE-2013-4164", "CVE-2014-4447", "CVE-2014-0061"], "modified": "2014-10-18T00:00:00", "id": "SECURITYVULNS:DOC:31300", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31300", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2021-06-08T18:51:48", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "edition": 2, "cvss3": {}, "published": "2014-05-15T00:00:00", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-2987", "CVE-2013-7377", "CVE-2013-7380", "CVE-2014-3744", "CVE-2014-3741", "CVE-2014-1418", "CVE-2014-3730", "CVE-2014-3738", "CVE-2014-3743", "CVE-2013-7381", "CVE-2013-7371", "CVE-2013-6393", "CVE-2013-7378", "CVE-2014-3453", "CVE-2013-7370", "CVE-2014-3111", "CVE-2014-3742", "CVE-2014-3756", "CVE-2013-4660", "CVE-2013-7379", "CVE-2014-2988", "CVE-2014-3225"], "modified": "2014-05-15T00:00:00", "id": "SECURITYVULNS:VULN:13778", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13778", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2021-06-08T19:03:07", "description": "62 vulnerabilities in different system components.", "edition": 2, "cvss3": {}, "published": "2014-10-18T00:00:00", "title": "Apple OS X / OS X Server multiple security vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-4433", "CVE-2014-3566", "CVE-2014-4371", "CVE-2014-4430", "CVE-2014-4437", "CVE-2014-4405", "CVE-2014-4351", "CVE-2014-4422", "CVE-2014-4424", "CVE-2014-4441", "CVE-2014-4428", "CVE-2014-4444", "CVE-2014-4388", "CVE-2014-7169", "CVE-2014-4391", "CVE-2014-4443", "CVE-2014-4375", "CVE-2014-4406", "CVE-2014-4421", "CVE-2014-0098", "CVE-2013-3919", "CVE-2014-4440", "CVE-2014-0065", "CVE-2014-4431", "CVE-2013-6438", "CVE-2014-4408", "CVE-2014-4426", "CVE-2014-3537", "CVE-2014-0064", "CVE-2014-0591", "CVE-2014-4439", "CVE-2014-0063", "CVE-2014-4438", "CVE-2013-5150", "CVE-2014-6271", "CVE-2013-6393", "CVE-2014-4434", "CVE-2014-0060", "CVE-2014-4425", "CVE-2014-4417", "CVE-2014-4442", "CVE-2014-0062", "CVE-2014-4446", "CVE-2014-4418", "CVE-2014-4404", "CVE-2014-4420", "CVE-2013-4854", "CVE-2014-0066", "CVE-2014-4427", "CVE-2014-4435", "CVE-2011-2391", "CVE-2014-4407", "CVE-2013-4164", "CVE-2014-4447", "CVE-2014-4436", "CVE-2014-4432", "CVE-2014-4380", "CVE-2014-0061", "CVE-2014-4364", "CVE-2014-4419", "CVE-2014-4373"], "modified": "2014-10-18T00:00:00", "id": "SECURITYVULNS:VULN:14050", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14050", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nodejs": [{"lastseen": "2021-09-23T06:36:01", "description": "## Overview\n\nVersions 0.2.2 and earlier depend on native libyaml version 0.1.5 or earlier. As such, they are affected by a heap-based buffer overflow vulnerability that may result in a crash or arbitrary code execution when parsing YAML tags.\n\n\n\n\n## Recommendation\n\n- Update to version 0.2.3 that includes a version of LibYAML that contains a fix for this issue.\n\n## References\n\n- [CVE-2013-6393](http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-6393)\n- [Commit #bce8b60](https://bitbucket.org/xi/libyaml/commits/bce8b60f0b9af69fa9fab3093d0a41ba243de048)\n- [GitHub Advisory](https://github.com/advisories/GHSA-m75h-cghq-c8h5)", "cvss3": {}, "published": "2015-10-17T19:41:46", "type": "nodejs", "title": "Heap Based Buffer Overflow", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2021-09-23T07:54:56", "id": "NODEJS:21", "href": "https://www.npmjs.com/advisories/21", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "ubuntucve": [{"lastseen": "2021-11-22T21:52:23", "description": "The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5\nperforms an incorrect cast, which allows remote attackers to cause a denial\nof service (application crash) and possibly execute arbitrary code via\ncrafted tags in a YAML document, which triggers a heap-based buffer\noverflow.\n\n#### Bugs\n\n * <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737076>\n * <https://bugzilla.redhat.com/show_bug.cgi?id=1033990>\n * <https://bugs.launchpad.net/bugs/1276156>\n * <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738587>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | regression was introduced in USN-2098-1 redhat created three patches: libyaml-string-overflow.patch is upstream 1d73f004f49e6962cf936da98aecf0aec95c4c50 libyaml-node-id-hardening.patch seems to have been done differently upstream in b77d42277c32b58a114a0fa0968038a4b0ab24f4 libyaml-indent-column-overflow-v2.patch was done differently upstream in f859ed1eb757a3562b98a28a8ce69274bfd4b3f2 and af3599437a87162554787c52d8b16eab553f537b\n", "cvss3": {}, "published": "2014-01-27T00:00:00", "type": "ubuntucve", "title": "CVE-2013-6393", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-01-27T00:00:00", "id": "UB:CVE-2013-6393", "href": "https://ubuntu.com/security/CVE-2013-6393", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2022-01-04T12:53:40", "description": "Florian Weimer discovered that LibYAML incorrectly handled certain large \nyaml documents. An attacker could use this issue to cause LibYAML to crash, \nresulting in a denial of service, or possibly execute arbitrary code.\n", "cvss3": {}, "published": "2014-02-04T00:00:00", "type": "ubuntu", "title": "LibYAML vulnerability", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-02-04T00:00:00", "id": "USN-2098-1", "href": "https://ubuntu.com/security/notices/USN-2098-1", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-04T12:52:29", "description": "Florian Weimer discovered that libyaml-libyaml-perl incorrectly handled \ncertain large YAML documents. An attacker could use this issue to cause \nlibyaml-libyaml-perl to crash, resulting in a denial of service, or \npossibly execute arbitrary code. (CVE-2013-6393)\n\nIvan Fratric discovered that libyaml-libyaml-perl incorrectly handled \ncertain malformed YAML documents. An attacker could use this issue to cause \nlibyaml-libyaml-perl to crash, resulting in a denial of service, or \npossibly execute arbitrary code. (CVE-2014-2525)\n", "cvss3": {}, "published": "2014-04-03T00:00:00", "type": "ubuntu", "title": "libyaml-libyaml-perl vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-2525", "CVE-2013-6393"], "modified": "2014-04-03T00:00:00", "id": "USN-2161-1", "href": "https://ubuntu.com/security/notices/USN-2161-1", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:52", "description": "YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. ", "cvss3": {}, "published": "2014-02-08T05:01:45", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: libyaml-0.1.4-6.fc19", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-02-08T05:01:45", "id": "FEDORA:D73B221A90", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/3VYP7NNGMHH3X5IOKIIGWYKH5JBU2372/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "description": "YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. ", "cvss3": {}, "published": "2014-02-08T05:00:26", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: libyaml-0.1.4-6.fc20", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-02-08T05:00:26", "id": "FEDORA:8737221A51", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/XLEYOJ77K2QO6AAXFSDYNYIBDNPCIJ3E/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "description": "YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. ", "cvss3": {}, "published": "2014-04-05T04:52:10", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: libyaml-0.1.6-1.fc20", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2014-04-05T04:52:10", "id": "FEDORA:A3CBA21972", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/7WX66OJRSLAKCR5BV75XR56VCT4SM2OB/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "description": "YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. ", "cvss3": {}, "published": "2014-04-05T04:57:08", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: libyaml-0.1.6-1.fc19", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2014-04-05T04:57:08", "id": "FEDORA:91B4F215C2", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/Q6QIP2VOPT7RSHWH6KEBVLUZIK3ZEDNL/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-06-08T18:43:42", "description": "Kirill Siminov's \"libyaml\" is arguably the best YAML implementation. The C library is written precisely to the YAML 1.1 specification. It was original ly bound to Python and was later bound to Ruby. ", "cvss3": {}, "published": "2014-04-07T03:24:16", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: perl-YAML-LibYAML-0.41-4.fc20", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2014-04-07T03:24:16", "id": "FEDORA:5F2F2211E6", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/HEIZ3WVK63RL3GGSWDXZLP62MFQUD5AQ/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-06-08T18:43:42", "description": "Kirill Siminov's \"libyaml\" is arguably the best YAML implementation. The C library is written precisely to the YAML 1.1 specification. It was original ly bound to Python and was later bound to Ruby. ", "cvss3": {}, "published": "2014-04-07T03:25:42", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: perl-YAML-LibYAML-0.41-4.fc19", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2014-04-07T03:25:42", "id": "FEDORA:312F221198", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/P3EF36A6Q45SLKR2F3B2B4C7ZXAZ5IWX/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-06-08T18:43:42", "description": "Kirill Siminov's \"libyaml\" is arguably the best YAML implementation. The C library is written precisely to the YAML 1.1 specification. It was original ly bound to Python and was later bound to Ruby. ", "cvss3": {}, "published": "2014-12-13T09:35:05", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: perl-YAML-LibYAML-0.54-1.fc19", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525", "CVE-2014-9130"], "modified": "2014-12-13T09:35:05", "id": "FEDORA:C2D0060CA53E", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BGJCDYXNPHXD6MKTJU7XBCFLN5H6YBY2/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-06-08T18:43:42", "description": "Kirill Siminov's \"libyaml\" is arguably the best YAML implementation. The C library is written precisely to the YAML 1.1 specification. It was original ly bound to Python and was later bound to Ruby. ", "cvss3": {}, "published": "2014-12-12T04:31:36", "type": "fedora", "title": "[SECURITY] Fedora 21 Update: perl-YAML-LibYAML-0.54-1.fc21", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525", "CVE-2014-9130"], "modified": "2014-12-12T04:31:36", "id": "FEDORA:0679160D4B6D", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4E3RT2VZB3IYFJ4QL4DYYW5OBE32UN3F/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "description": "YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. ", "cvss3": {}, "published": "2014-12-13T09:44:43", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: libyaml-0.1.6-2.fc19", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525", "CVE-2014-9130"], "modified": "2014-12-13T09:44:43", "id": "FEDORA:605506087ECF", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/V37YGH2NREHVZIE2XKZEPMT5SHOLI2CW/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-06-08T18:43:42", "description": "Kirill Siminov's \"libyaml\" is arguably the best YAML implementation. The C library is written precisely to the YAML 1.1 specification. It was original ly bound to Python and was later bound to Ruby. ", "cvss3": {}, "published": "2014-12-13T09:50:36", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: perl-YAML-LibYAML-0.54-1.fc20", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525", "CVE-2014-9130"], "modified": "2014-12-13T09:50:36", "id": "FEDORA:E551360D2AB7", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/43TQRXQPI6NPE6NEPQNBFHJIXUWAU7UU/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "description": "YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. ", "cvss3": {}, "published": "2014-12-13T09:51:34", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: libyaml-0.1.6-2.fc20", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525", "CVE-2014-9130"], "modified": "2014-12-13T09:51:34", "id": "FEDORA:5C63B60DF38D", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/YUHSSK4JHGHUIECVIMLU5MNYTQ6UY36H/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "osv": [{"lastseen": "2022-05-11T21:40:26", "description": "Versions 0.2.2 and earlier depend on native libyaml version 0.1.5 or earlier. As such, they are affected by a heap-based buffer overflow vulnerability that may result in a crash or arbitrary code execution when parsing YAML tags.\n\n\n\n\n\n## Recommendation\n\n- Update to version 0.2.3 that includes a version of LibYAML that contains a fix for this issue.", "cvss3": {}, "published": "2020-08-31T22:51:50", "type": "osv", "title": "Heap Based Buffer Overflow in libyaml", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2021-09-23T20:56:01", "id": "OSV:GHSA-M75H-CGHQ-C8H5", "href": "https://osv.dev/vulnerability/GHSA-m75h-cghq-c8h5", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2022-03-23T14:33:33", "description": "The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.", "cvss3": {}, "published": "2014-02-06T22:55:00", "type": "cve", "title": "CVE-2013-6393", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/a:pyyaml:libyaml:0.1.4", "cpe:/a:redhat:openstack:3.0", "cpe:/o:opensuse:opensuse:11.4", "cpe:/o:opensuse:opensuse:13.2", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:opensuse:leap:42.1", "cpe:/o:opensuse:opensuse:13.1", "cpe:/a:pyyaml:libyaml:0.1.2", "cpe:/a:pyyaml:libyaml:0.1.3", "cpe:/a:pyyaml:libyaml:0.1.1", "cpe:/o:canonical:ubuntu_linux:13.10", "cpe:/o:debian:debian_linux:7.0", "cpe:/a:redhat:openstack:4.0", "cpe:/o:debian:debian_linux:6.0", "cpe:/a:pyyaml:libyaml:0.0.1", "cpe:/o:canonical:ubuntu_linux:12.04"], "id": "CVE-2013-6393", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6393", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:pyyaml:libyaml:0.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe:2.3:a:pyyaml:libyaml:0.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:a:pyyaml:libyaml:0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:pyyaml:libyaml:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:pyyaml:libyaml:0.1.4:*:*:*:*:*:*:*"]}], "github": [{"lastseen": "2021-12-22T11:54:28", "description": "Versions 0.2.2 and earlier depend on native libyaml version 0.1.5 or earlier. As such, they are affected by a heap-based buffer overflow vulnerability that may result in a crash or arbitrary code execution when parsing YAML tags.\n\n\n\n\n\n## Recommendation\n\n- Update to version 0.2.3 that includes a version of LibYAML that contains a fix for this issue.", "cvss3": {}, "published": "2020-08-31T22:51:50", "type": "github", "title": "Heap Based Buffer Overflow in libyaml", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2021-09-23T20:56:05", "id": "GHSA-M75H-CGHQ-C8H5", "href": "https://github.com/advisories/GHSA-m75h-cghq-c8h5", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "mageia": [{"lastseen": "2022-04-18T11:19:34", "description": "Updated libyaml packages fix security vulnerabilities: Florian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially-crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-6393). \n", "cvss3": {}, "published": "2014-02-08T19:11:21", "type": "mageia", "title": "Updated yaml packages fix CVE-2013-6393\n", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393"], "modified": "2014-02-08T19:11:21", "id": "MGASA-2014-0040", "href": "https://advisories.mageia.org/MGASA-2014-0040.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-18T11:19:34", "description": "Updated perl-YAML-LibYAML packages fix security vulnerabilities: Florian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially-crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-6393). Ivan Fratric of the Google Security Team discovered a heap-based buffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a specially-crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2014-2525). The perl-YAML-LibYAML package is being updated as it contains an embedded copy of LibYAML. \n", "cvss3": {}, "published": "2014-04-03T01:02:12", "type": "mageia", "title": "Updated perl-YAML-LibYAML package fixes security vulnerabilies\n", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2014-04-03T01:02:12", "id": "MGASA-2014-0154", "href": "https://advisories.mageia.org/MGASA-2014-0154.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2021-10-19T20:38:57", "description": "YAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and emitter\nwritten in C.\n\nA buffer overflow flaw was found in the way the libyaml library parsed URLs\nin YAML documents. An attacker able to load specially crafted YAML input to\nan application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2014-2525)\n\nAn integer overflow flaw was found in the way the libyaml library handled\nexcessively long YAML tags. An attacker able to load specially crafted YAML\ninput to application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2013-6393)\n\nRed Hat would like to thank oCERT for reporting the CVE-2014-2525 issue.\noCERT acknowledges Ivan Fratric of the Google Security Team as the original\nreporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the\nRed Hat Product Security Team.\n\nNote: In their default configuration, applications distributed via the Red\nHat Common channel do not use the libyaml library for parsing YAML, and are\ntherefore not vulnerable to these issues.\n\nAll libyaml users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. All running\napplications linked against the libyaml library must be restarted for this\nupdate to take effect.\n", "cvss3": {}, "published": "2014-04-17T00:00:00", "type": "redhat", "title": "(RHSA-2014:0415) Important: libyaml security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2018-06-07T04:58:45", "id": "RHSA-2014:0415", "href": "https://access.redhat.com/errata/RHSA-2014:0415", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-19T20:36:39", "description": "YAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and emitter\nwritten in C.\n\nA buffer overflow flaw was found in the way the libyaml library parsed URLs\nin YAML documents. An attacker able to load specially crafted YAML input to\nan application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2014-2525)\n\nAn integer overflow flaw was found in the way the libyaml library handled\nexcessively long YAML tags. An attacker able to load specially crafted YAML\ninput to application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2013-6393)\n\nRed Hat would like to thank oCERT for reporting the CVE-2014-2525 issue.\noCERT acknowledges Ivan Fratric of the Google Security Team as the original\nreporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the\nRed Hat Product Security Team.\n\nAll libyaml users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. All running\napplications linked against the libyaml library must be restarted for this\nupdate to take effect.\n", "cvss3": {}, "published": "2014-04-02T00:00:00", "type": "redhat", "title": "(RHSA-2014:0353) Important: libyaml security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2018-06-12T21:27:36", "id": "RHSA-2014:0353", "href": "https://access.redhat.com/errata/RHSA-2014:0353", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-19T20:39:46", "description": "YAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and emitter\nwritten in C.\n\nA buffer overflow flaw was found in the way the libyaml library parsed URLs\nin YAML documents. An attacker able to load specially crafted YAML input to\nan application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2014-2525)\n\nAn integer overflow flaw was found in the way the libyaml library handled\nexcessively long YAML tags. An attacker able to load specially crafted YAML\ninput to application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2013-6393)\n\nRed Hat would like to thank oCERT for reporting the CVE-2014-2525 issue.\noCERT acknowledges Ivan Fratric of the Google Security Team as the original\nreporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the\nRed Hat Product Security Team.\n\nAll ruby193-libyaml users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. All running\napplications linked against the libyaml library must be restarted for this\nupdate to take effect.\n", "cvss3": {}, "published": "2014-04-02T00:00:00", "type": "redhat", "title": "(RHSA-2014:0355) Important: ruby193-libyaml security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2018-06-12T21:28:27", "id": "RHSA-2014:0355", "href": "https://access.redhat.com/errata/RHSA-2014:0355", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-19T20:38:15", "description": "YAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and emitter\nwritten in C.\n\nA buffer overflow flaw was found in the way the libyaml library parsed URLs\nin YAML documents. An attacker able to load specially crafted YAML input to\nan application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2014-2525)\n\nAn integer overflow flaw was found in the way the libyaml library handled\nexcessively long YAML tags. An attacker able to load specially crafted YAML\ninput to application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2013-6393)\n\nRed Hat would like to thank oCERT for reporting the CVE-2014-2525 issue.\noCERT acknowledges Ivan Fratric of the Google Security Team as the original\nreporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the\nRed Hat Product Security Team.\n\nAll ruby193-libyaml users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. All running\napplications linked against the libyaml library must be restarted for this\nupdate to take effect.\n", "cvss3": {}, "published": "2014-04-03T00:00:00", "type": "redhat", "title": "(RHSA-2014:0364) Important: ruby193-libyaml security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2018-06-12T21:27:36", "id": "RHSA-2014:0364", "href": "https://access.redhat.com/errata/RHSA-2014:0364", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-19T20:40:47", "description": "YAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and emitter\nwritten in C.\n\nA buffer overflow flaw was found in the way the libyaml library parsed URLs\nin YAML documents. An attacker able to load specially crafted YAML input to\nan application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2014-2525)\n\nAn integer overflow flaw was found in the way the libyaml library handled\nexcessively long YAML tags. An attacker able to load specially crafted YAML\ninput to application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2013-6393)\n\nRed Hat would like to thank oCERT for reporting the CVE-2014-2525 issue.\noCERT acknowledges Ivan Fratric of the Google Security Team as the original\nreporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the\nRed Hat Product Security Team.\n\nAll libyaml users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. All running\napplications linked against the libyaml library must be restarted for this\nupdate to take effect.\n", "cvss3": {}, "published": "2014-04-02T00:00:00", "type": "redhat", "title": "(RHSA-2014:0354) Important: libyaml security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2018-06-06T22:47:45", "id": "RHSA-2014:0354", "href": "https://access.redhat.com/errata/RHSA-2014:0354", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2022-02-27T11:54:02", "description": "**CentOS Errata and Security Advisory** CESA-2014:0355\n\n\nYAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and emitter\nwritten in C.\n\nA buffer overflow flaw was found in the way the libyaml library parsed URLs\nin YAML documents. An attacker able to load specially crafted YAML input to\nan application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2014-2525)\n\nAn integer overflow flaw was found in the way the libyaml library handled\nexcessively long YAML tags. An attacker able to load specially crafted YAML\ninput to application using libyaml could cause the application to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2013-6393)\n\nRed Hat would like to thank oCERT for reporting the CVE-2014-2525 issue.\noCERT acknowledges Ivan Fratric of the Google Security Team as the original\nreporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the\nRed Hat Product Security Team.\n\nAll ruby193-libyaml users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. All running\napplications linked against the libyaml library must be restarted for this\nupdate to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2014-May/057226.html\n\n**Affected packages:**\nruby193-libyaml\nruby193-libyaml-devel\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2014:0355", "cvss3": {}, "published": "2014-05-21T17:51:09", "type": "centos", "title": "ruby193 security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6393", "CVE-2014-2525"], "modified": "2014-05-21T17:51:09", "id": "CESA-2014:0355", "href": "https://lists.centos.org/pipermail/centos-announce/2014-May/057226.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}