Lucene search

K
ubuntucveUbuntu.comUB:CVE-2013-6393
HistoryJan 27, 2014 - 12:00 a.m.

CVE-2013-6393

2014-01-2700:00:00
ubuntu.com
ubuntu.com
9

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.031 Low

EPSS

Percentile

90.9%

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5
performs an incorrect cast, which allows remote attackers to cause a denial
of service (application crash) and possibly execute arbitrary code via
crafted tags in a YAML document, which triggers a heap-based buffer
overflow.

Bugs

Notes

Author Note
mdeslaur regression was introduced in USN-2098-1 redhat created three patches: libyaml-string-overflow.patch is upstream 1d73f004f49e6962cf936da98aecf0aec95c4c50 libyaml-node-id-hardening.patch seems to have been done differently upstream in b77d42277c32b58a114a0fa0968038a4b0ab24f4 libyaml-indent-column-overflow-v2.patch was done differently upstream in f859ed1eb757a3562b98a28a8ce69274bfd4b3f2 and af3599437a87162554787c52d8b16eab553f537b
OSVersionArchitecturePackageVersionFilename
ubuntu12.04noarchlibyaml< 0.1.4-2ubuntu0.12.04.1UNKNOWN
ubuntu12.10noarchlibyaml< 0.1.4-2ubuntu0.12.10.1UNKNOWN
ubuntu13.10noarchlibyaml< 0.1.4-2ubuntu0.13.10.1UNKNOWN
ubuntu12.04noarchlibyaml-libyaml-perl< 0.38-2ubuntu0.1UNKNOWN
ubuntu12.10noarchlibyaml-libyaml-perl< 0.38-3ubuntu0.12.10.1UNKNOWN
ubuntu13.10noarchlibyaml-libyaml-perl< 0.38-3ubuntu0.13.10.1UNKNOWN

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.031 Low

EPSS

Percentile

90.9%