Lucene search

K
freebsdFreeBSD111F1F84-1D14-4FF2-A9EA-CF07119C0D3B
HistoryNov 24, 2013 - 12:00 a.m.

libyaml heap overflow resulting in possible code execution

2013-11-2400:00:00
vuxml.freebsd.org
11

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.031 Low

EPSS

Percentile

90.9%

libyaml was prone to a heap overflow that could result in
arbitrary code execution. Pkg uses libyaml to parse
the package manifests in some cases. Pkg also used libyaml
to parse the remote repository until 1.2.
RedHat Product Security Team reports on libyaml:

A heap-based buffer overflow flaw was found in the way libyaml
parsed YAML tags. A remote attacker could provide a
specially-crafted YAML document that, when parsed by an application
using libyaml, would cause the application to crash or, potentially,
execute arbitrary code with the privileges of the user running the
application.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchlibyaml< 0.1.4_3UNKNOWN
FreeBSDanynoarchpkg< 1.2.6UNKNOWN
FreeBSDanynoarchpkg-devel< 1.2.6UNKNOWN

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.031 Low

EPSS

Percentile

90.9%