[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-321 ---- libyaml

ID: oval:org.secpod.oval:def:1600157Date: (C)2016-01-05   (M)2022-10-10
Class: PATCHFamily: unix




Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.

Platform:
Amazon Linux AMI
Product:
libyaml
Reference:
ALAS-2014-321
CVE-2014-2525
CVE    1
CVE-2014-2525
CPE    8
cpe:/o:amazon:linux
cpe:/a:pyyaml:libyaml:0.0.1
cpe:/a:pyyaml:libyaml:0.1.1
cpe:/a:pyyaml:libyaml:0.1.2
...

© SecPod Technologies