Vigil@nce - LibYAML: buffer overflow of yaml_parser_scan_uri_escapes
April 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can generate a buffer overflow of LibYAML, in order to
trigger a denial of service, and possibly to execute code.
Impacted products: Debian, Fedora, MBS, MES, openSUSE, RHEL,
Ubuntu, Unix (platform)
Severity: 2/4
Creation date: 27/03/2014
DESCRIPTION OF THE VULNERABILITY
The LibYAML library is used to read data files in YAML (YAML Ain’t
Markup Language) format.
However, if the size of an url escaped with "%hh" is greater than
the size of the storage array, an overflow occurs in the
yaml_parser_scan_uri_escapes() function of the src/scanner.c file.
An attacker can therefore generate a buffer overflow of LibYAML,
in order to trigger a denial of service, and possibly to execute
code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/LibYAML-buffer-overflow-of-yaml-parser-scan-uri-escapes-14488