Vulnerability Description
yaml-rust 0.4.0 and earlier is affected by: Uncontrolled Recursion. The impact is: Denial of service by impossible to catch abort. The component is: YamlLoader::load_from_str function. The attack vector is: Parsing of a malicious YAML document. The fixed version is: 0.4.1 and later.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yaml-Rust Project | Yaml-Rust | <= 0.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/chyh1990/yaml-rust/pull/109Issue TrackingPatchThird Party Advisory
- https://github.com/chyh1990/yaml-rust/pull/109Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2019-1010182?
CVE-2019-1010182 is a vulnerability with a CVSS score of 6.5 (MEDIUM). yaml-rust 0.4.0 and earlier is affected by: Uncontrolled Recursion. The impact is: Denial of service by impossible to catch abort. The component is: YamlLoader::load_from_str function. The attack vect...
How severe is CVE-2019-1010182?
CVE-2019-1010182 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-1010182?
Check the references section above for vendor advisories and patch information. Affected products include: Yaml-Rust Project Yaml-Rust.