FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

libyaml heap overflow resulting in possible code execution

Affected packages
libyaml < 0.1.4_3
pkg < 1.2.6
pkg-devel < 1.2.6

Details

VuXML ID 111f1f84-1d14-4ff2-a9ea-cf07119c0d3b
Discovery 2013-11-24
Entry 2014-02-01
Modified 2014-02-01

libyaml was prone to a heap overflow that could result in arbitrary code execution. Pkg uses libyaml to parse the package manifests in some cases. Pkg also used libyaml to parse the remote repository until 1.2.

RedHat Product Security Team reports on libyaml:

A heap-based buffer overflow flaw was found in the way libyaml parsed YAML tags. A remote attacker could provide a specially-crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

References

CVE Name CVE-2013-6393
URL https://bugzilla.redhat.com/show_bug.cgi?id=1033990