Name | CVE-2017-11692 |
Description | The function "Token& Scanner::peek" in scanner.cpp in yaml-cpp 0.5.3 and earlier allows remote attackers to cause a denial of service (assertion failure and application exit) via a '!2' string. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
NVD severity | medium (attack range: remote) |
Debian Bugs | 870326, 870327 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
yaml-cpp (PTS) | jessie | 0.5.1-1 | vulnerable |
| stretch | 0.5.2-4 | vulnerable |
| buster, sid | 0.6.2-4 | vulnerable |
yaml-cpp0.3 (PTS) | jessie | 0.3.0-1.1 | vulnerable |
| stretch | 0.3.0-1.2 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[buster] - yaml-cpp <no-dsa> (Minor issue)
[stretch] - yaml-cpp <no-dsa> (Minor issue)
[jessie] - yaml-cpp <no-dsa> (Minor issue)
[wheezy] - yaml-cpp <no-dsa> (Minor issue)
[stretch] - yaml-cpp0.3 <no-dsa> (Minor issue)
[jessie] - yaml-cpp0.3 <no-dsa> (Minor issue)
https://github.com/jbeder/yaml-cpp/issues/519