Описание
The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 0.1.4-3ubuntu1 |
| lucid | ignored | end of life |
| precise | released | 0.1.4-2ubuntu0.12.04.1 |
| quantal | released | 0.1.4-2ubuntu0.12.10.1 |
| raring | ignored | end of life |
| saucy | released | 0.1.4-2ubuntu0.13.10.1 |
| upstream | released | 0.1.5 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.41-5 |
| lucid | ignored | end of life |
| precise | released | 0.38-2ubuntu0.1 |
| quantal | released | 0.38-3ubuntu0.12.10.1 |
| saucy | released | 0.38-3ubuntu0.13.10.1 |
| upstream | needed |
Показывать по
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0 ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
6.8 Medium
CVSS2