Mandriva Linux Security Advisory : yaml (MDVSA-2015:060)

medium Nessus Plugin ID 81943

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Updated yaml packages fix security vulnerabilities :

Florian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-6393).

Ivan Fratric of the Google Security Team discovered a heap-based buffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a specially crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2014-2525).

An assertion failure was found in the way the libyaml library parsed wrapped strings. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash (CVE-2014-9130).

Solution

Update the affected lib64yaml-devel and / or lib64yaml0_2 packages.

See Also

http://advisories.mageia.org/MGASA-2014-0040.html

http://advisories.mageia.org/MGASA-2014-0150.html

http://advisories.mageia.org/MGASA-2014-0508.html

Plugin Details

Severity: Medium

ID: 81943

File Name: mandriva_MDVSA-2015-060.nasl

Version: 1.4

Type: local

Published: 3/19/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64yaml-devel, p-cpe:/a:mandriva:linux:lib64yaml0_2, cpe:/o:mandriva:business_server:2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 3/13/2015

Reference Information

CVE: CVE-2013-6393, CVE-2014-2525, CVE-2014-9130

MDVSA: 2015:060