[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-324 ---- perl-YAML-LibYAML

ID: oval:org.secpod.oval:def:1600081Date: (C)2016-01-07   (M)2022-10-10
Class: PATCHFamily: unix




The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.

Platform:
Amazon Linux AMI
Product:
perl-YAML-LibYAML
Reference:
ALAS-2014-324
CVE-2013-6393
CVE-2014-2525
CVE    2
CVE-2013-6393
CVE-2014-2525
CPE    2
cpe:/o:amazon:linux
cpe:/a:pyyaml:perl-yaml-libyaml

© SecPod Technologies