Lucene search

K
redosRedosROS-20240514-03
HistoryMay 14, 2024 - 12:00 a.m.

ROS-20240514-03

2024-05-1400:00:00
redos.red-soft.ru
4
snakeyaml
serialization
deserialization
vulnerability
memory
exploitation
attacker
remote code execution
unix

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

Low

0.008 Low

EPSS

Percentile

81.8%

The vulnerability of SnakeYAML library for serialization and deserialization of YAML documents is related to
recovery of an invalid data structure in memory. Exploitation of the vulnerability could allow
an attacker acting remotely to execute arbitrary code

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64snakeyaml<=ย 2.2-1UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

Low

0.008 Low

EPSS

Percentile

81.8%