CVE-2014-2525
28.03.2014, 15:55
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.Enginsight
Vendor | Product | Version |
---|---|---|
pyyaml | libyaml | 𝑥 ≤ 0.1.5 |
pyyaml | libyaml | 0.0.1 |
pyyaml | libyaml | 0.1.1 |
pyyaml | libyaml | 0.1.2 |
pyyaml | libyaml | 0.1.3 |
pyyaml | libyaml | 0.1.4 |
opensuse | leap | 42.1 |
opensuse | opensuse | 13.1 |
opensuse | opensuse | 13.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||
---|---|---|---|---|---|---|---|---|---|
libyaml |
| ||||||||
libyaml-libyaml-perl |
|
Common Weakness Enumeration
References