Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-6393

Опубликовано: 27 янв. 2014
Источник: redhat
CVSS2: 4.3

Описание

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.

A heap based buffer oveflow exists in the libyaml package such that a remote attacker could provide a specifically crafted YAML document when parsed by the application could result in remote code execution and complete compromise of the system.

Отчет

The Red Hat security response team has rated this issue as having low security impact in Red Hat Enterpise MRG 1 and 2, CloudForms 3, and Red Hat Network Satellite 5. This issue is not currently planned to be addressed in future updates.Redhat satellite 6 does not ship libyaml The Red Hat security response team has rated this issue as having low security impact in Red Hat Update Infrastructure. A future update may address this issue. The Red Hat security response team has rated this issue as having moderate security impact in Subscription Asset Manager 1. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5ruby193-libyamlNot affected
OpenShift Enterprise 1ruby193-libyamlWill not fix
Red Hat Enterprise Linux 6libyamlAffected
Red Hat Enterprise Linux 7libyamlNot affected
Red Hat Enterprise MRG 1libyamlWill not fix
Red Hat Enterprise MRG 2libyamlWill not fix
Red Hat Satellite 5libyamlWill not fix
Red Hat Satellite 6libyamlNot affected
Red Hat Satellite 6ruby193-libyamlNot affected
Red Hat Software CollectionslibyamlAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1033990libyaml: heap-based buffer overflow when parsing YAML tags

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
около 12 лет назад

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.

nvd
около 12 лет назад

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.

debian
около 12 лет назад

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0 ...

github
больше 5 лет назад

Heap Based Buffer Overflow in libyaml

fstec
около 12 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

4.3 Medium

CVSS2