CVE Vulnerabilities

CVE-2019-6292

Uncontrolled Recursion

Published: Jan 15, 2019 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.3 LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
NEGLIGIBLE
root.io logo minimus.io logo echo.ai logo

An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++) 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Remote attackers could leverage this vulnerability to cause a denial-of-service via a cpp file.

Weakness

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

Affected Software

NameVendorStart VersionEnd Version
Yaml-cppYaml-cpp_project0.6.2 (including)0.6.2 (including)
Yaml-cppUbuntubionic*
Yaml-cppUbuntucosmic*
Yaml-cppUbuntudisco*
Yaml-cppUbuntueoan*
Yaml-cppUbuntuesm-apps/bionic*
Yaml-cppUbuntuesm-apps/xenial*
Yaml-cppUbuntuesm-infra-legacy/trusty*
Yaml-cppUbuntuesm-infra/focal*
Yaml-cppUbuntufocal*
Yaml-cppUbuntutrusty*
Yaml-cppUbuntutrusty/esm*
Yaml-cppUbuntuupstream*
Yaml-cppUbuntuxenial*
Yaml-cpp0.3Ubuntubionic*
Yaml-cpp0.3Ubuntucosmic*
Yaml-cpp0.3Ubuntutrusty*
Yaml-cpp0.3Ubuntuxenial*

Potential Mitigations

References