Mandriva Linux Security Advisory: Updated perl-YAML-LibYAML packages fix heap-based buffer overflow vulnerabilitie
Reporter | Title | Published | Views | Family All 162 |
---|---|---|---|---|
![]() | libYAML buffer overflow | 31 Mar 201400:00 | – | securityvulns |
![]() | [USN-2098-1] LibYAML vulnerability | 10 Feb 201400:00 | – | securityvulns |
![]() | [SECURITY] [DSA 2885-1] libyaml-libyaml-perl security update | 27 Mar 201400:00 | – | securityvulns |
![]() | [oCERT-2014-003] LibYAML input sanitization errors | 31 Mar 201400:00 | – | securityvulns |
![]() | [SECURITY] [DSA 2884-1] libyaml security update | 27 Mar 201400:00 | – | securityvulns |
![]() | [oss-security] CVE request: various NodeJS module vulnerabilities | 15 May 201400:00 | – | securityvulns |
![]() | APPLE-SA-2014-04-22-1 Security Update 2014-002 | 4 May 201400:00 | – | securityvulns |
![]() | Apple Mac OS X multiple security vulnerabilities | 9 Apr 201500:00 | – | securityvulns |
![]() | Apple Mac OS X multiple security vulnerabilities | 30 May 201400:00 | – | securityvulns |
![]() | APPLE-SA-2014-10-16-3 OS X Server v4.0 | 18 Oct 201400:00 | – | securityvulns |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Mandriva Linux Security Advisory MDVSA-2014:069.
# The text itself is copyright (C) Mandriva S.A.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(73445);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2013-6393", "CVE-2014-2525");
script_bugtraq_id(65258, 66478);
script_xref(name:"MDVSA", value:"2014:069");
script_name(english:"Mandriva Linux Security Advisory : perl-YAML-LibYAML (MDVSA-2014:069)");
script_summary(english:"Checks rpm output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Mandriva Linux host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Updated perl-YAML-LibYAML packages fix security vulnerabilities :
Florian Weimer of the Red Hat Product Security Team discovered a
heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and
emitter library. A remote attacker could provide a YAML document with
a specially crafted tag that, when parsed by an application using
libyaml, would cause the application to crash or, potentially, execute
arbitrary code with the privileges of the user running the application
(CVE-2013-6393).
Ivan Fratric of the Google Security Team discovered a heap-based
buffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and
emitter library. A remote attacker could provide a specially crafted
YAML document that, when parsed by an application using libyaml, would
cause the application to crash or, potentially, execute arbitrary code
with the privileges of the user running the application
(CVE-2014-2525).
The perl-YAML-LibYAML package is being updated as it contains an
embedded copy of LibYAML."
);
script_set_attribute(
attribute:"see_also",
value:"http://advisories.mageia.org/MGASA-2014-0154.html"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected perl-YAML-LibYAML package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:perl-YAML-LibYAML");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:1");
script_set_attribute(attribute:"patch_publication_date", value:"2014/04/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/04/10");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.");
script_family(english:"Mandriva Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
flag = 0;
if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"perl-YAML-LibYAML-0.380.0-2.2.mbs1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo