Total vulnerabilities in the database
The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
Software | From | Fixed in |
---|---|---|
pyyaml / libyaml | 0.1.2 | 0.1.2.x |
pyyaml / libyaml | 0.1.3 | 0.1.3.x |
pyyaml / libyaml | 0.1.1 | 0.1.1.x |
pyyaml / libyaml | - | 0.1.4.x |
pyyaml / libyaml | 0.0.1 | 0.0.1.x |
canonical / ubuntu_linux | 13.10 | 13.10.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
canonical / ubuntu_linux | 12.10 | 12.10.x |
redhat / openstack | 4.0 | 4.0.x |
redhat / openstack | 3.0 | 3.0.x |
debian / debian_linux | 7.0 | 7.0.x |
debian / debian_linux | 6.0 | 6.0.x |
opensuse / opensuse | 11.4 | 11.4.x |
opensuse / leap | 42.1 | 42.1.x |
opensuse / opensuse | 13.1 | 13.1.x |
opensuse / opensuse | 13.2 | 13.2.x |
![]() |
- | 0.2.3 |