CVE-2022-41854

EUVD-2022-7446
Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.8 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H
GoogleCNA
5.8 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
Affected Products (NVD)
VendorProductVersion
snakeyaml_projectsnakeyaml
𝑥
< 1.32
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
snakeyaml
bookworm
1.33-2
fixed
bullseye
unimportant
sid
1.33-2
fixed
trixie
1.33-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
snakeyaml
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
trusty
needs-triage
xenial
needs-triage