CVE Vulnerabilities

CVE-2019-6285

Uncontrolled Recursion

Published: Jan 14, 2019 | Modified: Aug 24, 2020
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
3.7 LOW
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
LOW

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

Weakness

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

Affected Software

Name Vendor Start Version End Version
Yaml-cpp Yaml-cpp_project 0.6.2 (including) 0.6.2 (including)
Yaml-cpp Ubuntu bionic *
Yaml-cpp Ubuntu cosmic *
Yaml-cpp Ubuntu disco *
Yaml-cpp Ubuntu eoan *
Yaml-cpp Ubuntu esm-apps/bionic *
Yaml-cpp Ubuntu esm-apps/xenial *
Yaml-cpp Ubuntu esm-infra-legacy/trusty *
Yaml-cpp Ubuntu focal *
Yaml-cpp Ubuntu trusty *
Yaml-cpp Ubuntu trusty/esm *
Yaml-cpp Ubuntu upstream *
Yaml-cpp Ubuntu xenial *
Yaml-cpp0.3 Ubuntu bionic *
Yaml-cpp0.3 Ubuntu cosmic *
Yaml-cpp0.3 Ubuntu trusty *
Yaml-cpp0.3 Ubuntu xenial *

Potential Mitigations

References