CVE-2013-6393

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 91%
VendorProductVersion
pyyamllibyaml
𝑥
≤ 0.1.4
pyyamllibyaml
0.0.1
pyyamllibyaml
0.1.1
pyyamllibyaml
0.1.2
pyyamllibyaml
0.1.3
canonicalubuntu_linux
12.04
canonicalubuntu_linux
12.10
canonicalubuntu_linux
13.10
redhatopenstack
3.0
redhatopenstack
4.0
debiandebian_linux
6.0
debiandebian_linux
7.0
opensuseleap
42.1
opensuseopensuse
11.4
opensuseopensuse
13.1
opensuseopensuse
13.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libyaml
bullseye
0.2.2-1
fixed
sid
0.2.5-1
fixed
trixie
0.2.5-1
fixed
bookworm
0.2.5-1
fixed
libyaml-libyaml-perl
bullseye
0.82+repack-1
fixed
bookworm
0.86+ds-1
fixed
sid
0.902.0+ds-2
fixed
trixie
0.902.0+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libyaml
saucy
Fixed 0.1.4-2ubuntu0.13.10.1
released
raring
ignored
quantal
Fixed 0.1.4-2ubuntu0.12.10.1
released
precise
Fixed 0.1.4-2ubuntu0.12.04.1
released
lucid
ignored
libyaml-libyaml-perl
saucy
Fixed 0.38-3ubuntu0.13.10.1
released
quantal
Fixed 0.38-3ubuntu0.12.10.1
released
precise
Fixed 0.38-2ubuntu0.1
released
lucid
ignored
References