First published: Mon Nov 25 2013(Updated: )
A heap-based buffer overflow flaw was found in the way libyaml parsed YAML tags. A remote attacker could provide a specially-crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. Acknowledgements: This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/libyaml | <0.2.3 | 0.2.3 |
<=0.1.4 | ||
=0.0.1 | ||
=0.1.1 | ||
=0.1.2 | ||
=0.1.3 | ||
=12.04 | ||
=12.10 | ||
=13.10 | ||
=3.0 | ||
=4.0 | ||
=6.0 | ||
=7.0 | ||
=42.1 | ||
=11.4 | ||
=13.1 | ||
=13.2 | ||
redhat/libyaml | <0.1.5 | 0.1.5 |
libyaml | <=0.1.4 | |
libyaml | =0.0.1 | |
libyaml | =0.1.1 | |
libyaml | =0.1.2 | |
libyaml | =0.1.3 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Red Hat OpenStack for IBM Power | =3.0 | |
Red Hat OpenStack for IBM Power | =4.0 | |
Debian | =6.0 | |
Debian | =7.0 | |
SUSE Linux | =42.1 | |
SUSE Linux | =11.4 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6393 has a high severity rating due to its potential for remote code execution.
To fix CVE-2013-6393, upgrade libyaml to version 0.1.5 or higher.
CVE-2013-6393 affects various systems, including certain versions of Ubuntu, Debian, and OpenSUSE that utilize vulnerable libyaml versions.
The risks of CVE-2013-6393 include application crashes and potential arbitrary code execution by an attacker.
While CVE-2013-6393 is an older vulnerability, it remains a concern for systems that have not been updated and still use the vulnerable versions of libyaml.