Download
| Alert*
oval:org.secpod.oval:def:2000480
The function "Token& Scanner::peek" in scanner.cpp in yaml-cpp 0.5.3 and earlier allows remote attackers to cause a denial of service via a "!2" string. oval:org.secpod.oval:def:603658 libyaml-cpp-dev is installed oval:org.secpod.oval:def:2000529 An issue was discovered in singledocparser.cpp in yaml-cpp 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Remote attackers could leverage ... oval:org.secpod.oval:def:2000959 The SingleDocParser::HandleFlowSequence function in yaml-cpp 0.6.2 allows remote attackers to cause a denial of service via a crafted YAML file. oval:org.secpod.oval:def:2001632 The SingleDocParser::HandleFlowMap function in yaml-cpp 0.6.2 allows remote attackers to cause a denial of service via a crafted YAML file. oval:org.secpod.oval:def:2000901 The Scanner::EnsureTokensInQueue function in yaml-cpp 0.6.2 allows remote attackers to cause a denial of service via a crafted YAML file. oval:org.secpod.oval:def:2000663 The SingleDocParser::HandleNode function in yaml-cpp 0.5.3 allows remote attackers to cause a denial of service via a crafted YAML file. |