Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3132-1 | snakeyaml security update |
![]() |
EUVD-2022-6839 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. |
![]() |
GHSA-hhhw-99gj-p3c3 | snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write |
![]() |
USN-5944-1 | SnakeYAML vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 20 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-11-20T14:57:41.651Z
Reserved: 2022-08-25T00:00:00
Link: CVE-2022-38750

Updated: 2024-08-03T11:02:14.509Z

Status : Modified
Published: 2022-09-05T10:15:09.733
Modified: 2024-11-21T07:17:01.207
Link: CVE-2022-38750


No data.