First published: Mon Dec 08 2014(Updated: )
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libyaml | =0.1.5 | |
Libyaml | =0.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9130 has a moderate severity level as it can lead to denial of service (DoS) due to assertion failure and crash.
To fix CVE-2014-9130, you should upgrade LibYAML to version 0.1.7 or later where the vulnerability has been addressed.
CVE-2014-9130 affects LibYAML versions 0.1.5 and 0.1.6.
CVE-2014-9130 allows context-dependent attackers to launch a denial of service attack through specific line-wrapping inputs.
CVE-2014-9130 specifically affects LibYAML and does not apply to other software directly.