MEDIUM · 6.8

CVE-2013-6393

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execu...

Vulnerability Description

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
PyyamlLibyaml<= 0.1.4
CanonicalUbuntu Linux12.04
RedhatOpenstack3.0
DebianDebian Linux6.0
OpensuseLeap42.1
OpensuseOpensuse11.4

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-6393?

CVE-2013-6393 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execu...

How severe is CVE-2013-6393?

CVE-2013-6393 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-6393?

Check the references section above for vendor advisories and patch information. Affected products include: Pyyaml Libyaml, Canonical Ubuntu Linux, Redhat Openstack, Debian Debian Linux, Opensuse Leap.