CVE-2012-1152

Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
Debian logo
Debian Releases
Debian Product
Codename
libyaml-libyaml-perl
bullseye
0.82+repack-1
fixed
bookworm
0.86+ds-1
fixed
sid
0.902.0+ds-2
fixed
trixie
0.902.0+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libyaml-libyaml-perl
saucy
Fixed 0.38-2
released
raring
Fixed 0.38-2
released
quantal
Fixed 0.38-2
released
precise
Fixed 0.38-2
released
oneiric
ignored
natty
ignored
maverick
Fixed 0.33-1+squeeze1build0.10.10.1
released
lucid
ignored
hardy
dne
References