6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.707 High
EPSS
Percentile
98.0%
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in
LibYAML before 0.1.6 allows context-dependent attackers to execute
arbitrary code via a long sequence of percent-encoded characters in a URI
in a YAML file.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 12.04 | noarch | libyaml | <Β 0.1.4-2ubuntu0.12.04.3 | UNKNOWN |
ubuntu | 12.10 | noarch | libyaml | <Β 0.1.4-2ubuntu0.12.10.3 | UNKNOWN |
ubuntu | 13.10 | noarch | libyaml | <Β 0.1.4-2ubuntu0.13.10.3 | UNKNOWN |
ubuntu | 12.04 | noarch | libyaml-libyaml-perl | <Β 0.38-2ubuntu0.1 | UNKNOWN |
ubuntu | 12.10 | noarch | libyaml-libyaml-perl | <Β 0.38-3ubuntu0.12.10.1 | UNKNOWN |
ubuntu | 13.10 | noarch | libyaml-libyaml-perl | <Β 0.38-3ubuntu0.13.10.1 | UNKNOWN |
www.ocert.org/advisories/ocert-2014-003.html
launchpad.net/bugs/cve/CVE-2014-2525
nvd.nist.gov/vuln/detail/CVE-2014-2525
security-tracker.debian.org/tracker/CVE-2014-2525
ubuntu.com/security/notices/USN-2160-1
ubuntu.com/security/notices/USN-2161-1
www.cve.org/CVERecord?id=CVE-2014-2525
www.debian.org/security/2014/dsa-2884