First published: Fri Mar 28 2014(Updated: )
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PyYAML | <=0.1.5 | |
PyYAML | =0.0.1 | |
PyYAML | =0.1.1 | |
PyYAML | =0.1.2 | |
PyYAML | =0.1.3 | |
PyYAML | =0.1.4 | |
openSUSE | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2525 has a high severity rating due to its potential to allow arbitrary code execution via a vulnerability in the parsing of URIs.
To fix CVE-2014-2525, update LibYAML to version 0.1.6 or later, which contains the necessary security patches.
CVE-2014-2525 affects LibYAML versions prior to 0.1.6, including all versions between 0.0.1 and 0.1.5.
Yes, CVE-2014-2525 can be exploited by attackers via crafted YAML files containing specially encoded URIs.
Applications using affected versions of LibYAML are vulnerable to remote code execution, posing a significant security risk.