Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-2525


Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.


Published

2014-03-28T15:55:08.670

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application pyyaml libyaml ≤ 0.1.5 Yes
Application pyyaml libyaml 0.0.1 Yes
Application pyyaml libyaml 0.1.1 Yes
Application pyyaml libyaml 0.1.2 Yes
Application pyyaml libyaml 0.1.3 Yes
Application pyyaml libyaml 0.1.4 Yes
Operating System opensuse leap 42.1 Yes
Operating System opensuse opensuse 13.1 Yes
Operating System opensuse opensuse 13.2 Yes

References