CPANSA-YAML-LibYAML-2012-1152: YAML-LibYAML vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2012-09-09T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2012-09-09T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | Severity | ||
Original language | Language | en | |
Also referred to |
Vulnerability Description
Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.
Vulnerabilities
CVE-2012-1152
Vulnerability DescriptionMultiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.
Weakness | CWE-134 : Use of Externally-Controlled Format String |
---|
Product status
Known affected
Product | Score | ||||||||
---|---|---|---|---|---|---|---|---|---|
YAML-LibYAML greater than 0.38 and less than 0.57 |
|
Fixed
- YAML-LibYAML greater than or equal 0.57
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-YAML-LibYAML-2012-1152 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2012/cpansa-yaml-libyaml-2012-1152.json - https://bugzilla.redhat.com/show_bug.cgi?id=801738 external
https://bugzilla.redhat.com/show_bug.cgi?id=801738 - https://rt.cpan.org/Public/Bug/Display.html?id=46507 external
https://rt.cpan.org/Public/Bug/Display.html?id=46507 - http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077023.html external
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077023.html - http://www.openwall.com/lists/oss-security/2012/03/10/4 external
http://www.openwall.com/lists/oss-security/2012/03/10/4 - http://www.openwall.com/lists/oss-security/2012/03/09/6 external
http://www.openwall.com/lists/oss-security/2012/03/09/6 - http://www.debian.org/security/2012/dsa-2432 external
http://www.debian.org/security/2012/dsa-2432 - http://www.securityfocus.com/bid/52381 external
http://www.securityfocus.com/bid/52381 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548 external
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548 - http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077782.html external
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077782.html - https://rt.cpan.org/Public/Bug/Display.html?id=75365 external
https://rt.cpan.org/Public/Bug/Display.html?id=75365 - http://secunia.com/advisories/48317 external
http://secunia.com/advisories/48317 - http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077004.html external
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077004.html - http://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html external
http://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html - http://secunia.com/advisories/50277 external
http://secunia.com/advisories/50277 - http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html external
http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/73856 external
https://exchange.xforce.ibmcloud.com/vulnerabilities/73856 - CVE-2012-1152 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2012-1152
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Sun Sep 9 00:00:00 2012 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/