CVE-2014-2525

Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
pyyamllibyaml
𝑥
≤ 0.1.5
pyyamllibyaml
0.0.1
pyyamllibyaml
0.1.1
pyyamllibyaml
0.1.2
pyyamllibyaml
0.1.3
pyyamllibyaml
0.1.4
opensuseleap
42.1
opensuseopensuse
13.1
opensuseopensuse
13.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libyaml
bullseye
0.2.2-1
fixed
sid
0.2.5-1
fixed
trixie
0.2.5-1
fixed
bookworm
0.2.5-1
fixed
libyaml-libyaml-perl
bullseye
0.82+repack-1
fixed
bookworm
0.86+ds-1
fixed
sid
0.902.0+ds-2
fixed
trixie
0.902.0+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libyaml
saucy
Fixed 0.1.4-2ubuntu0.13.10.3
released
quantal
Fixed 0.1.4-2ubuntu0.12.10.3
released
precise
Fixed 0.1.4-2ubuntu0.12.04.3
released
lucid
ignored
libyaml-libyaml-perl
saucy
Fixed 0.38-3ubuntu0.13.10.1
released
quantal
Fixed 0.38-3ubuntu0.12.10.1
released
precise
Fixed 0.38-2ubuntu0.1
released
lucid
ignored
References