[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-2525Date: (C)2014-04-25   (M)2024-04-19


Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 8.6
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-57836
SECUNIA-57966
SECUNIA-57968
BID-66478
DSA-2884
DSA-2885
MDVSA-2015:060
RHSA-2014:0353
RHSA-2014:0354
RHSA-2014:0355
USN-2160-1
http://advisories.mageia.org/MGASA-2014-0150.html
http://support.apple.com/kb/HT6443
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
http://www.ocert.org/advisories/ocert-2014-003.html
https://bitbucket.org/xi/libyaml/commits/bce8b60f0b9af69fa9fab3093d0a41ba243de048
https://puppet.com/security/cve/cve-2014-2525
openSUSE-SU-2014:0500
openSUSE-SU-2015:0319
openSUSE-SU-2016:1067

CPE    7
cpe:/a:pyyaml:libyaml:0.0.1
cpe:/a:pyyaml:libyaml:0.1.1
cpe:/o:opensuse:opensuse:13.1
cpe:/a:pyyaml:libyaml:0.1.2
...
CWE    1
CWE-119
OVAL    19
oval:org.secpod.oval:def:106820
oval:org.secpod.oval:def:108042
oval:org.secpod.oval:def:106812
oval:org.secpod.oval:def:106813
...

© SecPod Technologies