Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-35328
HistoryJun 13, 2024 - 12:00 a.m.

CVE-2024-35328

2024-06-1300:00:00
ubuntu.com
ubuntu.com
46
libyaml vulnerability
ddos
yaml_parser_parse
implementation flaws
design flaws

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

9.6%

libyaml v0.2.5 is vulnerable to DDOS. Affected by this issue is the
function yaml_parser_parse of the file /src/libyaml/src/parser.c.

Bugs

Notes

Author Note
jdstrand golang-goyaml is a go translation of libyaml and shouldn’t share implementation flaws, but may share design flaws
mdeslaur This is a misuse of the API per the upstream libyaml developers. This CVE is likely to get rejected, marking as deferred to make sure.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

9.6%