Lucene search

K
redosRedosROS-20240514-05
HistoryMay 14, 2024 - 12:00 a.m.

ROS-20240514-05

2024-05-1400:00:00
redos.red-soft.ru
3
snakeyaml
vulnerability
serialization
deserialization
buffer overflow
stack
exploitation
denial of service
remote code execution
unix

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.8%

Vulnerability of SnakeYAML library for serialization and deserialization of YAML documents is related to a buffer overflow on the stack.
buffer overflow on the stack. Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service.
remotely to cause a denial of service

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64snakeyaml<=ย 2.2-1UNKNOWN

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.8%