CVE-2019-6292

Source
https://cve.org/CVERecord?id=CVE-2019-6292
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-6292.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-6292
Downstream
Related
Published
2019-01-15T00:29:00.477Z
Modified
2026-03-10T22:48:09.723631Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++) 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Remote attackers could leverage this vulnerability to cause a denial-of-service via a cpp file.

References

Affected packages

Git / github.com/jbeder/yaml-cpp

Affected ranges

Type
GIT
Repo
https://github.com/jbeder/yaml-cpp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.6.2"
        }
    ]
}

Affected versions

release-0.*
release-0.2.0
release-0.2.1
release-0.2.2
release-0.2.3
release-0.2.4
release-0.2.5
release-0.2.6
release-0.2.7
release-0.3.0
release-0.5.0
release-0.5.1
release-0.5.2
release-0.5.3
yaml-cpp-0.*
yaml-cpp-0.5.3
yaml-cpp-0.6.0
yaml-cpp-0.6.1
yaml-cpp-0.6.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-6292.json"