Your submission was sent successfully! Close

CVE-2013-6393

Published: 27 January 2014

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.

Priority

Medium

Status

Package Release Status
libyaml
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (0.1.4-2ubuntu0.12.04.1)
quantal
Released (0.1.4-2ubuntu0.12.10.1)
raring Ignored
(reached end-of-life)
saucy
Released (0.1.4-2ubuntu0.13.10.1)
upstream
Released (0.1.5)
libyaml-libyaml-perl
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (0.38-2ubuntu0.1)
quantal
Released (0.38-3ubuntu0.12.10.1)
saucy
Released (0.38-3ubuntu0.13.10.1)
upstream Needed

Notes

AuthorNote
mdeslaur
regression was introduced in USN-2098-1
redhat created three patches:
libyaml-string-overflow.patch is upstream
1d73f004f49e6962cf936da98aecf0aec95c4c50
libyaml-node-id-hardening.patch seems to have been done
differently upstream in b77d42277c32b58a114a0fa0968038a4b0ab24f4
libyaml-indent-column-overflow-v2.patch was done differently
upstream in f859ed1eb757a3562b98a28a8ce69274bfd4b3f2 and
af3599437a87162554787c52d8b16eab553f537b

References

Bugs