3 results (0.007 seconds)

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 3

scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping. scanner.c en LibYAML 0.1.5 y 0.1.6, utilizado en el módulo YAML-LibYAML (también conocido como YAML-XS) para Perl, permite a atacantes dependientes de contexto causar una denegación de servicio (fallo de aserción y caída) a través de vectores que involucran la envoltura de líneas (line-wrapping). An assertion failure was found in the way the libyaml library parsed wrapped strings. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash. • http://advisories.mageia.org/MGASA-2014-0508.html http://linux.oracle.com/errata/ELSA-2015-0100.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html http://rhn.redhat.com/errata/RHSA-2015-0100.html http://rhn.redhat.com/errata/RHSA-2015-0112.html http://rhn.redhat.com/errata/RHSA-2015-0260.html http://secunia.com/advisories/59947 http://secunia.com/advisories/60944 http://secunia.com/adv • CWE-20: Improper Input Validation CWE-617: Reachable Assertion •

CVSS: 6.8EPSS: 70%CPEs: 9EXPL: 1

Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file. Desbordamiento de buffer basado en memoria dinámica en la función yaml_parser_scan_uri_escapes en LibYAML anterior a 0.1.6 permite a atacantes dependientes de contexto ejecutar código arbitrario a través de una secuencia larga de caracteres codificados de porcentaje en una URI en un archivo YAML. • http://advisories.mageia.org/MGASA-2014-0150.html http://lists.opensuse.org/opensuse-updates/2014-04/msg00022.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html http://rhn.redhat.com/errata/RHSA-2014-0353.html http://rhn.redhat.com/errata/RHSA-2014-0354.html http://rhn.redhat.com/errata/RHSA-2014-0355.html http://secunia.com/advisories/57836 http://secunia.com/advisories/57966 http://secun • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 6.8EPSS: 2%CPEs: 16EXPL: 0

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow. La función yaml_parser_scan_tag_uri en scanner.c en LibYAML anterior a 0.1.5 lleva a cabo un "cast" incorrecto, lo que permite a atacantes remotos causar una denegación de servicio (caída de la aplicación) y probablemente ejecutar código arbitrario a través de etiquetas manipuladas en YAML. • http://advisories.mageia.org/MGASA-2014-0040.html http://archives.neohapsis.com/archives/bugtraq/2014-04/0134.html http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html http://lists.opensuse.org/opensuse-updates/2014-02/msg00064.html http://lists.opensuse.org/opensuse-updates/2014-02/msg00065.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html http://osvdb.org/102716 http://rhn.redhat.com&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •