CVE-2022-38750
DoS in SnakeYAML
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
El uso de snakeYAML para analizar archivos YAML no confiables puede ser vulnerable a ataques de DenegaciĆ³n de Servicio (DOS). Si el analizador es ejecutado en la entrada suministrada por el usuario, un atacante puede suministrar el contenido que hace que el analizador sea bloqueado por stackoverflow
A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-08-25 CVE Reserved
- 2022-09-05 CVE Published
- 2024-04-26 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-121: Stack-based Buffer Overflow
- CWE-787: Out-of-bounds Write
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html | Mailing List | |
https://security.netapp.com/advisory/ntap-20240315-0010 |
URL | Date | SRC |
---|---|---|
https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027 | 2024-08-03 | |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027 | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202305-28 | 2024-03-15 | |
https://access.redhat.com/security/cve/CVE-2022-38750 | 2023-06-15 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2129707 | 2023-06-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Snakeyaml Project Search vendor "Snakeyaml Project" | Snakeyaml Search vendor "Snakeyaml Project" for product "Snakeyaml" | < 1.31 Search vendor "Snakeyaml Project" for product "Snakeyaml" and version " < 1.31" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|