CVE-2017-5950

Metadata

medium
4.3
yaml-cpp0.3, yaml-cpp
CVE-2017-5950
cve.mitre.org, github.com
2017-04-03
2017-10-23 14:17
CVE-2017-5950 yaml-cpp
CVE-2017-5950 yaml-cpp0.3
2017-09-08 06:03
2017-07-20 21:30
2017-06-16 19:22
2017-05-10 23:46
2017-04-14 10:20
2017-04-04 02:03

Description

The SingleDocParser::HandleNode function in yaml-cpp (aka LibYaml-C++) 0.5.3 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
artful yaml-cpp None
yaml-cpp0.3 None
devel yaml-cpp None
yaml-cpp0.3 None
trusty yaml-cpp None
yaml-cpp0.3 None
upstream yaml-cpp None
yaml-cpp0.3 None
xenial yaml-cpp None
yaml-cpp0.3 None
zesty yaml-cpp None
yaml-cpp0.3 None

Unaffected

Release Package Reason
precise yaml-cpp0.3 DNE
yaml-cpp DNE
precise/esm yaml-cpp0.3 DNE
yaml-cpp DNE
vivid/stable-phone-overlay yaml-cpp0.3 DNE
yaml-cpp DNE
vivid/ubuntu-core yaml-cpp0.3 DNE
yaml-cpp DNE
yakkety yaml-cpp0.3 ignored
yaml-cpp ignored