Sha256: 25cd39613f9c7114d619156e9147b6d47bd8c6b51ed0605111c0caae92457ca5

Contents?: true

Size: 718 Bytes

Versions: 6

Compression:

Stored size: 718 Bytes

Contents

---
engine: ruby
cve: 2014-2525
osvdb: 105027
url: http://www.osvdb.org/show/osvdb/105027
title: |
  LibYAML yaml_parser_scan_uri_escapes() Function Crafted Document Parsing Heap
  Buffer Overflow
date: 2014-03-26
description: |
  LibYAML contains an overflow condition in the yaml_parser_scan_uri_escapes()
  function that is triggered as user-supplied input is not properly validated
  when parsing a specially crafted YAML document. This may allow a
  context-dependent attacker to cause a heap-based buffer overflow, resulting
  in a denial of service or potentially allowing the execution of arbitrary
  code in a program linked against the library.
cvss_v2: 6.8
patched_versions:
  - ~> 2.0.0.481
  - ">= 2.1.2"

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/rubies/ruby/CVE-2014-2525.yml
bundler-budit-0.6.2 data/ruby-advisory-db/rubies/ruby/OSVDB-105027.yml
bundler-budit-0.6.1 data/ruby-advisory-db/rubies/ruby/OSVDB-105027.yml
bundler-audit-0.6.1 data/ruby-advisory-db/rubies/ruby/OSVDB-105027.yml
bundler-audit-0.6.0 data/ruby-advisory-db/rubies/ruby/OSVDB-105027.yml
bundler-audit-0.5.0 data/ruby-advisory-db/rubies/ruby/OSVDB-105027.yml