6.5
CVSSv3

CVE-2018-20573

Published: 28/12/2018 Updated: 10/01/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote malicious users to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

yaml-cpp project yaml-cpp 0.6.2

Vendor Advisories

Debian Bug report logs - #918147 yaml-cpp: CVE-2018-20573: Stack Overflow in Scanner::EnsureTokensInQueue() Package: src:yaml-cpp; Maintainer for src:yaml-cpp is Simon Quigley <tsimonq2@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 3 Jan 2019 20:21:01 UTC Severity: important Tags: sec ...
The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 062 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file ...