CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
46.9%
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial
of Service attacks (DOS). If the parser is running on user supplied input,
an attacker may supply content that causes the parser to crash by
stackoverflow.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | snakeyaml | <ย 1.23-1+deb10u1build0.18.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | snakeyaml | <ย 1.25+ds-2ubuntu0.1 | UNKNOWN |
ubuntu | 22.04 | noarch | snakeyaml | <ย 1.29-1ubuntu0.22.04.1 | UNKNOWN |
ubuntu | 22.10 | noarch | snakeyaml | <ย 1.29-1ubuntu0.22.10.1 | UNKNOWN |
ubuntu | 14.04 | noarch | snakeyaml | <ย 1.12-2ubuntu0.14.04.1~esm1 | UNKNOWN |
ubuntu | 16.04 | noarch | snakeyaml | <ย 1.12-2ubuntu0.16.04.1~esm1 | UNKNOWN |
bitbucket.org/snakeyaml/snakeyaml/issues/525/got-stackoverflowerror-for-many-open
bugs.chromium.org/p/oss-fuzz/issues/detail?id=47024
launchpad.net/bugs/cve/CVE-2022-38749
nvd.nist.gov/vuln/detail/CVE-2022-38749
security-tracker.debian.org/tracker/CVE-2022-38749
ubuntu.com/security/notices/USN-5944-1
www.cve.org/CVERecord?id=CVE-2022-38749