Vulnerability Description
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pyyaml | Libyaml | <= 0.1.5 |
| Opensuse | Leap | 42.1 |
| Opensuse | Opensuse | 13.1 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0150.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00022.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2014-0353.html
- http://rhn.redhat.com/errata/RHSA-2014-0354.html
- http://rhn.redhat.com/errata/RHSA-2014-0355.html
- http://secunia.com/advisories/57836
- http://secunia.com/advisories/57966
- http://secunia.com/advisories/57968
- http://support.apple.com/kb/HT6443
- http://www.debian.org/security/2014/dsa-2884
- http://www.debian.org/security/2014/dsa-2885
- http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
FAQ
What is CVE-2014-2525?
CVE-2014-2525 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded char...
How severe is CVE-2014-2525?
CVE-2014-2525 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-2525?
Check the references section above for vendor advisories and patch information. Affected products include: Pyyaml Libyaml, Opensuse Leap, Opensuse Opensuse.