yaml-cpp 0.5.3 YAML File HandleNode memory corruption

A vulnerability has been found in yaml-cpp 0.5.3 and classified as problematic. Affected by this vulnerability is the function SingleDocParser::HandleNode of the component YAML File Handler. The manipulation leads to memory corruption. The CWE definition for the vulnerability is CWE-119. The bug was discovered 01/17/2017. The weakness was disclosed 04/03/2017 as 459 (Website). It is possible to read the advisory at securityfocus.com. This vulnerability is known as CVE-2017-5950. Local access is required to approach this attack. Technical details are available. There is no exploit available. The pricing for an exploit might be around USD $0-$5k at the moment. It is declared as not defined. The vulnerability was handled as a non-public zero-day exploit for at least 76 days. We expect the 0-day to have been worth approximately $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 107214 (SUSE SLED12 Security Update : yaml-cpp (SUSE-SU-2018:0631-1)), which helps to determine the existence of the flaw in a target environment. The commercial vulnerability scanner Qualys is able to test this issue with plugin 170910 (SUSE Enterprise Linux Security Update for yaml-cpp (SUSE-SU-2018:0631-1)). It is recommended to upgrade the affected component. A possible mitigation has been published 2 years after the disclosure of the vulnerability. The vulnerability is also documented other vulnerability databases: SecurityFocus (BID 97307) and Tenable (107214).

Field04/03/2017 04:58 PM08/25/2020 12:31 PM11/24/2022 06:20 PM
nameyaml-cppyaml-cppyaml-cpp
version0.5.30.5.30.5.3
componentYAML File HandlerYAML File HandlerYAML File Handler
functionSingleDocParser::HandleNodeSingleDocParser::HandleNodeSingleDocParser::HandleNode
cwe119 (memory corruption)119 (memory corruption)119 (memory corruption)
risk111
cvss2_vuldb_basescore4.34.34.3
cvss2_vuldb_tempscore3.73.73.7
cvss2_vuldb_avNNN
cvss2_vuldb_acMMM
cvss2_vuldb_auNNN
cvss2_vuldb_ciNNN
cvss2_vuldb_iiNNN
cvss2_vuldb_aiPPP
cvss2_nvd_avNNN
cvss2_nvd_acMMM
cvss2_nvd_auNNN
cvss2_nvd_ciNNN
cvss2_nvd_iiNNN
cvss2_nvd_aiPPP
cvss3_meta_basescore4.44.44.4
cvss3_meta_tempscore4.24.24.3
cvss3_vuldb_basescore3.33.33.3
cvss3_vuldb_tempscore3.23.23.2
cvss3_vuldb_avLLL
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiRRR
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iNNN
cvss3_vuldb_aLLL
cvss3_nvd_avLLL
cvss3_nvd_acLLL
cvss3_nvd_prNNN
cvss3_nvd_uiRRR
cvss3_nvd_sUUU
cvss3_nvd_cNNN
cvss3_nvd_iNNN
cvss3_nvd_aHHH
date1491177600 (04/03/2017)1491177600 (04/03/2017)1491177600 (04/03/2017)
urlhttp://www.securityfocus.com/bid/97307http://www.securityfocus.com/bid/97307http://www.securityfocus.com/bid/97307
price_0day$0-$5k$0-$5k$0-$5k
cveCVE-2017-5950CVE-2017-5950CVE-2017-5950
cve_assigned1486598400 (02/09/2017)1486598400 (02/09/2017)1486598400 (02/09/2017)
cve_nvd_published149117760014911776001491177600
cve_nvd_summaryThe SingleDocParser::HandleNode function in yaml-cpp (aka LibYaml-C++) 0.5.3 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.The SingleDocParser::HandleNode function in yaml-cpp (aka LibYaml-C++) 0.5.3 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.The SingleDocParser::HandleNode function in yaml-cpp (aka LibYaml-C++) 0.5.3 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
securityfocus973079730797307
securityfocus_titleyaml-cpp CVE-2017-5950 Stack Buffer Overflow Vulnerabilityyaml-cpp CVE-2017-5950 Stack Buffer Overflow Vulnerabilityyaml-cpp CVE-2017-5950 Stack Buffer Overflow Vulnerability
nessus_id107214107214107214
nessus_nameSUSE SLED12 Security Update : yaml-cpp (SUSE-SU-2018:0631-1)SUSE SLED12 Security Update : yaml-cpp (SUSE-SU-2018:0631-1)SUSE SLED12 Security Update : yaml-cpp (SUSE-SU-2018:0631-1)
nessus_filenamesuse_SU-2018-0631-1.naslsuse_SU-2018-0631-1.naslsuse_SU-2018-0631-1.nasl
nessus_riskMediumMediumMedium
nessus_familySuSE Local Security ChecksSuSE Local Security ChecksSuSE Local Security Checks
nessus_typelocallocallocal
nessus_date1520467200 (03/08/2018)1520467200 (03/08/2018)1520467200 (03/08/2018)
openvas_filenamegb_fedora_2018_1758d97170_yaml-cpp_fc28.naslgb_fedora_2018_1758d97170_yaml-cpp_fc28.naslgb_fedora_2018_1758d97170_yaml-cpp_fc28.nasl
openvas_titleFedora Update for yaml-cpp FEDORA-2018-1758d97170Fedora Update for yaml-cpp FEDORA-2018-1758d97170Fedora Update for yaml-cpp FEDORA-2018-1758d97170
openvas_familyFedora Local Security ChecksFedora Local Security ChecksFedora Local Security Checks
qualys_id170910170910170910
qualys_titleSUSE Enterprise Linux Security Update for yaml-cpp (SUSE-SU-2018:0631-1)SUSE Enterprise Linux Security Update for yaml-cpp (SUSE-SU-2018:0631-1)SUSE Enterprise Linux Security Update for yaml-cpp (SUSE-SU-2018:0631-1)
locationWebsiteWebsiteWebsite
cvss2_vuldb_eNDNDND
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_rcNDNDND
cvss3_vuldb_eXXX
cvss3_vuldb_rlOOO
cvss3_vuldb_rcXXX
reaction_days338338338
0day_days767676
exposure_days338338338
cvss3_nvd_basescore5.55.55.5
discoverydate14846112001484611200
nameUpgradeUpgrade
date1520380800 (03/07/2018)1520380800 (03/07/2018)
osvdb_titleCVE-2017-5950 - yaml-cpp - Denial of Service IssueCVE-2017-5950 - yaml-cpp - Denial of Service Issue
securityfocus_date1491177600 (04/03/2017)1491177600 (04/03/2017)
securityfocus_classBoundary Condition ErrorBoundary Condition Error
identifier459
cvss2_nvd_basescore4.3

Do you know our Splunk app?

Download it now for free!