A vulnerability has been found in yaml-cpp 0.5.3 and classified as problematic. Affected by this vulnerability is the function
SingleDocParser::HandleNode of the component YAML File Handler. The manipulation leads to memory corruption. The CWE definition for the vulnerability is CWE-119. The bug was discovered 01/17/2017. The weakness was disclosed 04/03/2017 as 459 (Website). It is possible to read the advisory at securityfocus.com.
This vulnerability is known as CVE-2017-5950. Local access is required to approach this attack. Technical details are available. There is no exploit available. The pricing for an exploit might be around USD $0-$5k at the moment.
It is declared as not defined. The vulnerability was handled as a non-public zero-day exploit for at least 76 days. We expect the 0-day to have been worth approximately $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 107214 (SUSE SLED12 Security Update : yaml-cpp (SUSE-SU-2018:0631-1)), which helps to determine the existence of the flaw in a target environment. The commercial vulnerability scanner Qualys is able to test this issue with plugin 170910 (SUSE Enterprise Linux Security Update for yaml-cpp (SUSE-SU-2018:0631-1)).
It is recommended to upgrade the affected component. A possible mitigation has been published 2 years after the disclosure of the vulnerability.
The vulnerability is also documented other vulnerability databases: SecurityFocus (BID 97307) and Tenable (107214).
Do you know our Splunk app?
Download it now for free!