CVE-2019-6285

Related Vulnerabilities: CVE-2019-6285  

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

The MITRE CVE dictionary describes this issue as:

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

Find out more about CVE-2019-6285 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 4.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact Low

Affected Packages State

Platform Package State
Red Hat Software Collections for Red Hat Enterprise Linux rh-mongodb32-yaml-cpp Under investigation
Red Hat Software Collections for Red Hat Enterprise Linux rh-mongodb34-yaml-cpp Under investigation
Red Hat Software Collections for Red Hat Enterprise Linux rh-mongodb36-yaml-cpp Under investigation
Red Hat Satellite 6 yaml-cpp Under investigation
Red Hat OpenStack Platform 9.0 yaml-cpp Under investigation
Red Hat OpenStack Platform 8.0 (Liberty) yaml-cpp Under investigation
Red Hat OpenStack Platform 14 yaml-cpp Under investigation
Red Hat OpenStack Platform 13.0 (Queens) yaml-cpp Under investigation
Red Hat OpenStack Platform 10 yaml-cpp Under investigation