Lucene search

K
cve[email protected]CVE-2013-6393
HistoryFeb 06, 2014 - 10:55 p.m.

CVE-2013-6393

2014-02-0622:55:03
CWE-119
web.nvd.nist.gov
62
cve-2013-6393
libyaml
denial of service
remote attackers
arbitrary code
heap-based buffer overflow

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

5.4 Medium

AI Score

Confidence

High

0.025 Low

EPSS

Percentile

90.2%

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.

Affected configurations

NVD
Node
pyyamllibyamlRange0.1.4
OR
pyyamllibyamlMatch0.0.1
OR
pyyamllibyamlMatch0.1.1
OR
pyyamllibyamlMatch0.1.2
OR
pyyamllibyamlMatch0.1.3
Node
canonicalubuntu_linuxMatch12.04lts
OR
canonicalubuntu_linuxMatch12.10
OR
canonicalubuntu_linuxMatch13.10
Node
redhatopenstackMatch3.0
OR
redhatopenstackMatch4.0
Node
debiandebian_linuxMatch6.0
OR
debiandebian_linuxMatch7.0
Node
opensuseleapMatch42.1
OR
opensuseopensuseMatch11.4
OR
opensuseopensuseMatch13.1
OR
opensuseopensuseMatch13.2

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

5.4 Medium

AI Score

Confidence

High

0.025 Low

EPSS

Percentile

90.2%