Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-38752

Опубликовано: 05 сент. 2022
Источник: debian
EPSS Низкий

Описание

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
snakeyamlfixed1.33-1package

Примечания

  • https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081

  • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47081 (not public)

  • Deemed a false positive by upstream, only added a test

EPSS

Процентиль: 37%
0.00163
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 3 лет назад

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.

CVSS3: 6.5
redhat
больше 3 лет назад

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.

CVSS3: 6.5
nvd
больше 3 лет назад

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.

CVSS3: 6.5
msrc
4 месяца назад

DoS in SnakeYAML

CVSS3: 6.5
github
больше 3 лет назад

snakeYAML before 1.32 vulnerable to Denial of Service due to Out-of-bounds Write

EPSS

Процентиль: 37%
0.00163
Низкий