6.5
CVSSv3

CVE-2019-6285

Published: 14/01/2019 Updated: 24/08/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote malicious users to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

yaml-cpp project yaml-cpp 0.6.2

Vendor Advisories

Debian Bug report logs - #919432 yaml-cpp: CVE-2019-6285 Package: src:yaml-cpp; Maintainer for src:yaml-cpp is Simon Quigley <tsimonq2@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 15 Jan 2019 21:15:01 UTC Severity: important Tags: security, upstream Found in version yaml-cpp/062-4 ...
The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 062 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file ...