CVE-2022-38752
DoS in SnakeYAML
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
El uso de snakeYAML para analizar archivos YAML no confiables puede ser vulnerable a ataques de DenegaciĆ³n de Servicio (DOS). Si el analizador es ejecutado en la entrada suministrada por el usuario, un atacante puede suministrar contenido que hace que el analizador sea bloqueado por desbordamiento de pila
A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2022-08-25 CVE Reserved
- 2022-09-05 CVE Published
- 2024-08-03 CVE Updated
- 2024-10-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-121: Stack-based Buffer Overflow
- CWE-787: Out-of-bounds Write
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081 | Third Party Advisory | |
https://security.netapp.com/advisory/ntap-20240315-0009 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202305-28 | 2024-03-15 | |
https://access.redhat.com/security/cve/CVE-2022-38752 | 2023-06-15 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2129710 | 2023-06-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Snakeyaml Project Search vendor "Snakeyaml Project" | Snakeyaml Search vendor "Snakeyaml Project" for product "Snakeyaml" | < 1.32 Search vendor "Snakeyaml Project" for product "Snakeyaml" and version " < 1.32" | - |
Affected
|