CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
55.6%
It was discovered that SnakeYAML did not limit the maximal nested depth
for collections when parsing YAML data. If a user or automated system were
tricked into opening a specially crafted YAML file, an attacker could
possibly use this issue to cause applications using SnakeYAML to crash,
resulting in a denial of service. (CVE-2022-25857, CVE-2022-38749,
CVE-2022-38750)
It was discovered that SnakeYAML did not limit the maximal data matched
with regular expressions when parsing YAML data. If a user or automated
system were tricked into opening a specially crafted YAML file, an
attacker could possibly use this issue to cause applications using
SnakeYAML to crash, resulting in a denial of service. (CVE-2022-38751)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.10 | noarch | libyaml-snake-java | < 1.29-1ubuntu0.22.10.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | libyaml-snake-java-doc | < 1.29-1ubuntu0.22.10.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libyaml-snake-java | < 1.29-1ubuntu0.22.04.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libyaml-snake-java-doc | < 1.29-1ubuntu0.22.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libyaml-snake-java | < 1.25+ds-2ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libyaml-snake-java-doc | < 1.25+ds-2ubuntu0.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libyaml-snake-java | < 1.23-1+deb10u1build0.18.04.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libyaml-snake-java-doc | < 1.23-1+deb10u1build0.18.04.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libyaml-snake-java | < 1.12-2ubuntu0.16.04.1~esm1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libyaml-snake-java | < 1.12-2 | UNKNOWN |