6.8
CVSSv2

CVE-2014-2525

Published: 28/03/2014 Updated: 30/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML prior to 0.1.6 allows context-dependent malicious users to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pyyaml libyaml 0.1.3

pyyaml libyaml 0.1.2

pyyaml libyaml

pyyaml libyaml 0.1.4

pyyaml libyaml 0.1.1

pyyaml libyaml 0.0.1

opensuse opensuse 13.2

opensuse opensuse 13.1

opensuse leap 42.1

Vendor Advisories

Debian Bug report logs - #742732 libyaml: CVE-2014-2525: input sanitization errors Package: libyaml; Maintainer for libyaml is Anders Kaseorg <andersk@mitedu>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 26 Mar 2014 19:03:01 UTC Severity: grave Tags: fixed-upstream, patch, security, upstream Fo ...
LibYAML could be made to crash or run programs if it opened a specially crafted YAML document ...
libyaml-libyaml-perl could be made to crash or run programs if it opened a specially crafted YAML file ...
Ivan Fratric of the Google Security Team discovered a heap-based buffer overflow vulnerability in LibYAML, a fast YAML 11 parser and emitter library A remote attacker could provide a specially-crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with ...
The yaml_parser_scan_tag_uri function in scannerc in LibYAML before 015 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow Heap-based buffer overflow in the yaml_parser_scan ...
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 016 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file ...