Vulnerability Details : CVE-2014-2525
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2014-2525
Probability of exploitation activity in the next 30 days: 82.58%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-2525
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
[email protected] |
CWE ids for CVE-2014-2525
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2014-2525
- http://rhn.redhat.com/errata/RHSA-2014-0355.html
-
http://www.ocert.org/advisories/ocert-2014-003.html
US Government Resource
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
- http://rhn.redhat.com/errata/RHSA-2014-0353.html
- http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
- http://support.apple.com/kb/HT6443
-
http://www.ubuntu.com/usn/USN-2160-1
-
http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html
Third Party Advisory
-
http://www.securityfocus.com/bid/66478
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:060
-
http://www.debian.org/security/2014/dsa-2884
-
http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html
Third Party Advisory
-
https://bitbucket.org/xi/libyaml/commits/bce8b60f0b9af69fa9fab3093d0a41ba243de048
Exploit;Patch
- http://rhn.redhat.com/errata/RHSA-2014-0354.html
-
http://lists.opensuse.org/opensuse-updates/2014-04/msg00022.html
Third Party Advisory
-
https://puppet.com/security/cve/cve-2014-2525
-
http://www.debian.org/security/2014/dsa-2885
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
-
http://advisories.mageia.org/MGASA-2014-0150.html
Third Party Advisory
Products affected by CVE-2014-2525
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
- cpe:2.3:a:pyyaml:libyaml:*:*:*:*:*:*:*:*
- cpe:2.3:a:pyyaml:libyaml:0.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:pyyaml:libyaml:0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:pyyaml:libyaml:0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:pyyaml:libyaml:0.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:pyyaml:libyaml:0.1.4:*:*:*:*:*:*:*