Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-41854

Опубликовано: 11 нояб. 2022
Источник: debian
EPSS Низкий

Описание

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
snakeyamlfixed1.33-1package
snakeyamlfixed1.23-1+deb10u1busterpackage

Примечания

  • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355

  • No suitable for parsing untrusted YAML, see README.Debian.security

EPSS

Процентиль: 26%
0.00092
Низкий

Связанные уязвимости

CVSS3: 5.8
ubuntu
около 3 лет назад

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

CVSS3: 6.5
redhat
около 3 лет назад

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

CVSS3: 5.8
nvd
около 3 лет назад

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

CVSS3: 5.8
msrc
2 месяца назад

Stack Overflow in Snakeyaml

CVSS3: 6.5
github
около 3 лет назад

Snakeyaml vulnerable to Stack overflow leading to denial of service

EPSS

Процентиль: 26%
0.00092
Низкий