Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://advisories.mageia.org/MGASA-2014-0150.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2014-04/msg00022.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2014-0353.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-0354.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-0355.html - | |
References | () http://secunia.com/advisories/57836 - | |
References | () http://secunia.com/advisories/57966 - | |
References | () http://secunia.com/advisories/57968 - | |
References | () http://support.apple.com/kb/HT6443 - | |
References | () http://www.debian.org/security/2014/dsa-2884 - | |
References | () http://www.debian.org/security/2014/dsa-2885 - | |
References | () http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ - | |
References | () http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ - | |
References | () http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2015:060 - | |
References | () http://www.ocert.org/advisories/ocert-2014-003.html - US Government Resource | |
References | () http://www.securityfocus.com/bid/66478 - | |
References | () http://www.ubuntu.com/usn/USN-2160-1 - | |
References | () https://bitbucket.org/xi/libyaml/commits/bce8b60f0b9af69fa9fab3093d0a41ba243de048 - Exploit, Patch | |
References | () https://puppet.com/security/cve/cve-2014-2525 - |
Information
Published : 2014-03-28 15:55
Updated : 2024-11-21 02:06
NVD link : CVE-2014-2525
Mitre link : CVE-2014-2525
CVE.ORG link : CVE-2014-2525
JSON object : View
Products Affected
pyyaml
- libyaml
opensuse
- opensuse
- leap
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer