Description
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2884-1 | libyaml security update |
Debian DSA |
DSA-2885-1 | libyaml-libyaml-perl security update |
Ubuntu USN |
USN-2160-1 | LibYAML vulnerability |
Ubuntu USN |
USN-2161-1 | libyaml-libyaml-perl vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T10:14:26.613Z
Reserved: 2014-03-17T00:00:00.000Z
Link: CVE-2014-2525
No data.
Status : Modified
Published: 2014-03-28T15:55:08.670
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-2525
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN