CVE Vulnerabilities

CVE-2019-6285

Uncontrolled Recursion

Published: Jan 14, 2019 | Modified: Nov 03, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
3.7 LOW
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

Weakness

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

Affected Software

NameVendorStart VersionEnd Version
Yaml-cppYaml-cpp_project0.6.2 (including)0.6.2 (including)
Yaml-cppUbuntubionic*
Yaml-cppUbuntucosmic*
Yaml-cppUbuntudisco*
Yaml-cppUbuntueoan*
Yaml-cppUbuntuesm-apps/bionic*
Yaml-cppUbuntuesm-apps/xenial*
Yaml-cppUbuntuesm-infra-legacy/trusty*
Yaml-cppUbuntuesm-infra/focal*
Yaml-cppUbuntufocal*
Yaml-cppUbuntutrusty*
Yaml-cppUbuntutrusty/esm*
Yaml-cppUbuntuupstream*
Yaml-cppUbuntuxenial*
Yaml-cpp0.3Ubuntubionic*
Yaml-cpp0.3Ubuntucosmic*
Yaml-cpp0.3Ubuntutrusty*
Yaml-cpp0.3Ubuntuxenial*

Potential Mitigations

References