Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3132-1 | snakeyaml security update |
![]() |
EUVD-2022-6773 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. |
![]() |
GHSA-c4r9-r8fh-9vj2 | snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write |
![]() |
USN-5944-1 | SnakeYAML vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-03T11:02:14.586Z
Reserved: 2022-08-25T00:00:00
Link: CVE-2022-38749

No data.

Status : Modified
Published: 2022-09-05T10:15:09.673
Modified: 2024-11-21T07:17:01.060
Link: CVE-2022-38749


No data.