Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-41854

Опубликовано: 11 нояб. 2022
Источник: debian
EPSS Низкий

Описание

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
snakeyamlfixed1.33-1package
snakeyamlfixed1.23-1+deb10u1busterpackage

Примечания

  • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355

  • No suitable for parsing untrusted YAML, see README.Debian.security

EPSS

Процентиль: 24%
0.00082
Низкий

Связанные уязвимости

CVSS3: 5.8
ubuntu
больше 3 лет назад

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

CVSS3: 6.5
redhat
больше 3 лет назад

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

CVSS3: 5.8
nvd
больше 3 лет назад

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

CVSS3: 5.8
msrc
6 месяцев назад

Stack Overflow in Snakeyaml

CVSS3: 6.5
github
больше 3 лет назад

Snakeyaml vulnerable to Stack overflow leading to denial of service

EPSS

Процентиль: 24%
0.00082
Низкий