Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
2014-03-28T15:55:08.670
2025-04-12T10:46:40.837
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | pyyaml | libyaml | ≤ 0.1.5 | Yes |
Application | pyyaml | libyaml | 0.0.1 | Yes |
Application | pyyaml | libyaml | 0.1.1 | Yes |
Application | pyyaml | libyaml | 0.1.2 | Yes |
Application | pyyaml | libyaml | 0.1.3 | Yes |
Application | pyyaml | libyaml | 0.1.4 | Yes |
Operating System | opensuse | leap | 42.1 | Yes |
Operating System | opensuse | opensuse | 13.1 | Yes |
Operating System | opensuse | opensuse | 13.2 | Yes |