Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-38750

Опубликовано: 05 сент. 2022
Источник: debian
EPSS Низкий

Описание

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
snakeyamlfixed1.31-1package
snakeyamlfixed1.28-1+deb11u1bullseyepackage

Примечания

  • https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027

  • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027

  • Test case: https://bitbucket.org/snakeyaml/snakeyaml/commits/a8a072311547574274036f4a1b91a751b397a055 (snakeyaml-1.31)

EPSS

Процентиль: 24%
0.00083
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 3 лет назад

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

CVSS3: 5.5
redhat
больше 3 лет назад

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

CVSS3: 6.5
nvd
больше 3 лет назад

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

CVSS3: 6.5
msrc
4 месяца назад

DoS in SnakeYAML

CVSS3: 5.5
github
больше 3 лет назад

snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write

EPSS

Процентиль: 24%
0.00083
Низкий