Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6769 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. |
Github GHSA |
GHSA-9w3m-gqgf-c4p9 | snakeYAML before 1.32 vulnerable to Denial of Service due to Out-of-bounds Write |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-03T11:02:14.529Z
Reserved: 2022-08-25T00:00:00
Link: CVE-2022-38752
Updated: 2024-08-03T11:02:14.529Z
Status : Modified
Published: 2022-09-05T10:15:09.847
Modified: 2024-11-21T07:17:01.483
Link: CVE-2022-38752
OpenCVE Enrichment
No data.
EUVD
Github GHSA