CVE Vulnerabilities

CVE-2019-6292

Uncontrolled Recursion

Published: Jan 15, 2019 | Modified: Aug 24, 2020
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.3 LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
NEGLIGIBLE

An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++) 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Remote attackers could leverage this vulnerability to cause a denial-of-service via a cpp file.

Weakness

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

Affected Software

Name Vendor Start Version End Version
Yaml-cpp Yaml-cpp_project 0.6.2 (including) 0.6.2 (including)
Yaml-cpp Ubuntu bionic *
Yaml-cpp Ubuntu cosmic *
Yaml-cpp Ubuntu disco *
Yaml-cpp Ubuntu eoan *
Yaml-cpp Ubuntu esm-apps/bionic *
Yaml-cpp Ubuntu esm-apps/xenial *
Yaml-cpp Ubuntu esm-infra-legacy/trusty *
Yaml-cpp Ubuntu focal *
Yaml-cpp Ubuntu trusty *
Yaml-cpp Ubuntu trusty/esm *
Yaml-cpp Ubuntu upstream *
Yaml-cpp Ubuntu xenial *
Yaml-cpp0.3 Ubuntu bionic *
Yaml-cpp0.3 Ubuntu cosmic *
Yaml-cpp0.3 Ubuntu trusty *
Yaml-cpp0.3 Ubuntu xenial *

Potential Mitigations

References