Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-20573

Опубликовано: 28 дек. 2018
Источник: debian
EPSS Низкий

Описание

The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
yaml-cppfixed0.6.3-1package
yaml-cppno-dsabusterpackage
yaml-cppno-dsastretchpackage
yaml-cpppostponedjessiepackage
yaml-cpp0.3removedpackage
yaml-cpp0.3no-dsastretchpackage
yaml-cpp0.3postponedjessiepackage

Примечания

  • https://github.com/jbeder/yaml-cpp/issues/655

EPSS

Процентиль: 75%
0.00891
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 7 лет назад

The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

CVSS3: 3.7
redhat
около 7 лет назад

The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

CVSS3: 6.5
nvd
около 7 лет назад

The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

CVSS3: 6.5
msrc
больше 5 лет назад

The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

CVSS3: 6.5
github
больше 3 лет назад

The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

EPSS

Процентиль: 75%
0.00891
Низкий