The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | libyaml | 2014-02-26 14:27 | ALAS-2014-291 |
Amazon Linux 1 | perl-YAML-LibYAML | 2014-04-17 14:18 | ALAS-2014-324 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 4.3 | AV:A/AC:H/Au:N/C:P/I:P/A:P |
NVD | CVSSv2 | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P |