FreeBSD : libyaml heap overflow resulting in possible code execution (111f1f84-1d14-4ff2-a9ea-cf07119c0d3b)

Medium Nessus Plugin ID 72247


The remote FreeBSD host is missing one or more security-related updates.


libyaml was prone to a heap overflow that could result in arbitrary code execution. Pkg uses libyaml to parse the package manifests in some cases. Pkg also used libyaml to parse the remote repository until 1.2.

RedHat Product Security Team reports on libyaml :

A heap-based buffer overflow flaw was found in the way libyaml parsed YAML tags. A remote attacker could provide a specially crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 72247

File Name: freebsd_pkg_111f1f841d144ff2a9eacf07119c0d3b.nasl

Version: $Revision: 1.3 $

Type: local

Published: 2014/02/03

Modified: 2014/08/16

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:libyaml, p-cpe:/a:freebsd:freebsd:pkg, p-cpe:/a:freebsd:freebsd:pkg-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2014/02/01

Vulnerability Publication Date: 2013/11/24

Reference Information

CVE: CVE-2013-6393