CVE-2022-38751
DoS in SnakeYAML
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
El uso de snakeYAML para analizar archivos YAML no confiables puede ser vulnerable a ataques de DenegaciĆ³n de Servicio (DOS). Si el analizador es ejecutado en la entrada suministrada por el usuario, un atacante puede suministrar el contenido que hace que el analizador sea bloqueado por desbordamiento de pila
A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-08-25 CVE Reserved
- 2022-09-05 CVE Published
- 2024-08-03 CVE Updated
- 2024-10-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-121: Stack-based Buffer Overflow
- CWE-787: Out-of-bounds Write
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://bitbucket.org/snakeyaml/snakeyaml/issues/530/stackoverflow-oss-fuzz-47039 | Third Party Advisory | |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47039 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html | Mailing List | |
https://security.netapp.com/advisory/ntap-20240315-0010 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202305-28 | 2024-03-15 | |
https://access.redhat.com/security/cve/CVE-2022-38751 | 2023-06-15 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2129709 | 2023-06-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Snakeyaml Project Search vendor "Snakeyaml Project" | Snakeyaml Search vendor "Snakeyaml Project" for product "Snakeyaml" | < 1.31 Search vendor "Snakeyaml Project" for product "Snakeyaml" and version " < 1.31" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|