cvelist/2013/6xxx/CVE-2013-6393.json
2019-03-18 05:09:19 +00:00

162 lines
5.7 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6393",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2014:0273",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00065.html"
},
{
"name": "DSA-2870",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2870"
},
{
"name": "APPLE-SA-2014-10-16-3",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1033990",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033990"
},
{
"name": "APPLE-SA-2014-04-22-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-04/0134.html"
},
{
"name": "102716",
"refsource": "OSVDB",
"url": "http://osvdb.org/102716"
},
{
"name": "https://bugzilla.redhat.com/attachment.cgi?id=847926&action=diff",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/attachment.cgi?id=847926&action=diff"
},
{
"name": "MDVSA-2015:060",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:060"
},
{
"name": "65258",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65258"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0040.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0040.html"
},
{
"name": "openSUSE-SU-2015:0319",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html"
},
{
"name": "RHSA-2014:0355",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0355.html"
},
{
"name": "openSUSE-SU-2014:0272",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00064.html"
},
{
"name": "RHSA-2014:0354",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0354.html"
},
{
"name": "https://support.apple.com/kb/HT6536",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6536"
},
{
"name": "openSUSE-SU-2016:1067",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html"
},
{
"name": "DSA-2850",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2850"
},
{
"name": "RHSA-2014:0353",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0353.html"
},
{
"name": "https://bitbucket.org/xi/libyaml/commits/tag/0.1.5",
"refsource": "CONFIRM",
"url": "https://bitbucket.org/xi/libyaml/commits/tag/0.1.5"
},
{
"name": "https://puppet.com/security/cve/cve-2013-6393",
"refsource": "CONFIRM",
"url": "https://puppet.com/security/cve/cve-2013-6393"
},
{
"name": "USN-2098-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2098-1"
}
]
}
}