LibYAML input sanitization errors

ID 580CC46B-BB1E-11E3-B144-2C4138874F7D
Type freebsd
Reporter FreeBSD
Modified 2014-03-11T00:00:00


oCERT reports:

The LibYAML project is an open source YAML 1.1 parser and emitter written in C. The library is affected by a heap-based buffer overflow which can lead to arbitrary code execution. The vulnerability is caused by lack of proper expansion for the string passed to the yaml_parser_scan_uri_escapes() function. A specially crafted YAML file, with a long sequence of percent-encoded characters in a URL, can be used to trigger the overflow.