The yaml_parser_scan_tag_uri in LibYAML before 0.1.5 allows remote attackers to cause denial of service and possibly execute arbitrary code via crafted tags in a YAML document
Reporter | Title | Published | Views | Family All 112 |
---|---|---|---|---|
![]() | Debian Security Advisory DSA 2870-1 (libyaml-libyaml-perl - heap-based buffer overflow) | 8 Mar 201400:00 | – | openvas |
![]() | Mageia: Security Advisory (MGASA-2014-0040) | 28 Jan 202200:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-2098-1) | 11 Feb 201400:00 | – | openvas |
![]() | Debian Security Advisory DSA 2850-1 (libyaml - heap-based buffer overflow) | 31 Jan 201400:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-2850-1) | 30 Jan 201400:00 | – | openvas |
![]() | Amazon Linux: Security Advisory (ALAS-2014-291) | 8 Sep 201500:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-2870-1) | 7 Mar 201400:00 | – | openvas |
![]() | Ubuntu Update for libyaml USN-2098-1 | 11 Feb 201400:00 | – | openvas |
![]() | Fedora Update for libyaml FEDORA-2014-1851 | 6 Aug 201400:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 201403-02 | 29 Sep 201500:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | libyaml | 0.1.4-3 | libyaml_0.1.4-3_all.deb |
Debian | 11 | all | libyaml | 0.1.4-3 | libyaml_0.1.4-3_all.deb |
Debian | 999 | all | libyaml | 0.1.4-3 | libyaml_0.1.4-3_all.deb |
Debian | 13 | all | libyaml | 0.1.4-3 | libyaml_0.1.4-3_all.deb |
Debian | 12 | all | libyaml-libyaml-perl | 0.41-4 | libyaml-libyaml-perl_0.41-4_all.deb |
Debian | 11 | all | libyaml-libyaml-perl | 0.41-4 | libyaml-libyaml-perl_0.41-4_all.deb |
Debian | 999 | all | libyaml-libyaml-perl | 0.41-4 | libyaml-libyaml-perl_0.41-4_all.deb |
Debian | 13 | all | libyaml-libyaml-perl | 0.41-4 | libyaml-libyaml-perl_0.41-4_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo