Lucene search

K
freebsdFreeBSD580CC46B-BB1E-11E3-B144-2C4138874F7D
HistoryMar 11, 2014 - 12:00 a.m.

LibYAML input sanitization errors

2014-03-1100:00:00
vuxml.freebsd.org
20

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.731 High

EPSS

Percentile

98.1%

oCERT reports:

The LibYAML project is an open source YAML 1.1 parser and
emitter written in C.
The library is affected by a heap-based buffer overflow
which can lead to arbitrary code execution. The
vulnerability is caused by lack of proper expansion for the
string passed to the yaml_parser_scan_uri_escapes()
function.
A specially crafted YAML file, with a long sequence of
percent-encoded characters in a URL, can be used to trigger
the overflow.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchlibyaml<Β 0.1.6UNKNOWN
FreeBSDanynoarchmingw32-libyaml<Β 0.1.6UNKNOWN

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.731 High

EPSS

Percentile

98.1%