MEDIUM · 6.5

CVE-2019-1010183

serde serde_yaml 0.6.0 to 0.8.3 is affected by: Uncontrolled Recursion. The impact is: Denial of service by aborting. The component is: from_* functions (all deserialization functions). The attack vec...

Vulnerability Description

serde serde_yaml 0.6.0 to 0.8.3 is affected by: Uncontrolled Recursion. The impact is: Denial of service by aborting. The component is: from_* functions (all deserialization functions). The attack vector is: Parsing a malicious YAML file. The fixed version is: 0.8.4 and later.

CVSS Score

6.5

MEDIUM

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
Serde-Yaml ProjectSerde-Yaml>= 0.6.0, <= 0.8.3

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-1010183?

CVE-2019-1010183 is a vulnerability with a CVSS score of 6.5 (MEDIUM). serde serde_yaml 0.6.0 to 0.8.3 is affected by: Uncontrolled Recursion. The impact is: Denial of service by aborting. The component is: from_* functions (all deserialization functions). The attack vec...

How severe is CVE-2019-1010183?

CVE-2019-1010183 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-1010183?

Check the references section above for vendor advisories and patch information. Affected products include: Serde-Yaml Project Serde-Yaml.