Uploaded image for project: 'Funtoo Linux'
  1. Funtoo Linux
  2. FL-9657

yaml-cpp-0.6.2 multiple vulnerables

    • Icon: Security Vulnerability Security Vulnerability
    • Resolution: Fixed
    • Icon: Normal Normal
    • None
    • None

      {
        "id": "CVE-2019-6285",
        "is_known_exploited_vuln": false,
        "description": "The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.",
        "urls": [
          "https://nvd.nist.gov/vuln/detail/CVE-2019-6285",
          "https://github.com/jbeder/yaml-cpp/issues/660"
        ]
      }
      
      {
        "id": "CVE-2019-6292",
        "is_known_exploited_vuln": false,
        "description": "An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++) 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Remote attackers could leverage this vulnerability to cause a denial-of-service via a cpp file.",
        "urls": [
          "https://nvd.nist.gov/vuln/detail/CVE-2019-6292",
          "https://github.com/jbeder/yaml-cpp/issues/657"
        ]
      }
      
      {
        "id": "CVE-2018-20573",
        "is_known_exploited_vuln": false,
        "description": "The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.",
        "urls": [
          "https://nvd.nist.gov/vuln/detail/CVE-2018-20573",
          "https://github.com/jbeder/yaml-cpp/issues/655"
        ]
      }
      
      {
        "id": "CVE-2018-20574",
        "is_known_exploited_vuln": false,
        "description": "The SingleDocParser::HandleFlowMap function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.",
        "urls": [
          "https://nvd.nist.gov/vuln/detail/CVE-2018-20574",
          "https://github.com/jbeder/yaml-cpp/issues/654"
        ]
      }
      

            Unassigned Unassigned
            tczaude tczaude
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated:
              Resolved: