VYPR
Critical severityNVD Advisory· Published Feb 6, 2014· Updated Apr 29, 2026

CVE-2013-6393

CVE-2013-6393

Description

The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
libyamlnpm
< 0.2.30.2.3

Affected products

16
  • Pyyaml/Libyaml5 versions
    cpe:2.3:a:pyyaml:libyaml:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:a:pyyaml:libyaml:*:*:*:*:*:*:*:*range: <=0.1.4
    • cpe:2.3:a:pyyaml:libyaml:0.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:pyyaml:libyaml:0.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:pyyaml:libyaml:0.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:pyyaml:libyaml:0.1.3:*:*:*:*:*:*:*
  • Red Hat/Openstack2 versions
    cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:openstack:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 2 more
    • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
  • OpenSUSE/openSUSE3 versions
    cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

28

News mentions

0

No linked articles in our index yet.