Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2012-1152 First vendor Publication 2012-09-09
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1152

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-134 Uncontrolled Format String (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:15295
 
Oval ID: oval:org.mitre.oval:def:15295
Title: DSA-2432-1 libyaml-libyaml-perl -- format string vulnerabilities
Description: Dominic Hargreaves and Niko Tyni discovered two format string vulnerabilities in YAML::LibYAML, a Perl interface to the libyaml library.
Family: unix Class: patch
Reference(s): DSA-2432-1
CVE-2012-1152
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): libyaml-libyaml-perl
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2012-08-30 Name : Fedora Update for perl-YAML-LibYAML FEDORA-2012-4871
File : nvt/gb_fedora_2012_4871_perl-YAML-LibYAML_fc17.nasl
2012-04-30 Name : Debian Security Advisory DSA 2432-1 (libyaml-libyaml-perl)
File : nvt/deb_2432_1.nasl
2012-04-11 Name : Fedora Update for perl-YAML-LibYAML FEDORA-2012-4997
File : nvt/gb_fedora_2012_4997_perl-YAML-LibYAML_fc15.nasl
2012-04-11 Name : Fedora Update for perl-YAML-LibYAML FEDORA-2012-5035
File : nvt/gb_fedora_2012_5035_perl-YAML-LibYAML_fc16.nasl

Nessus® Vulnerability Scanner

Date Description
2015-02-20 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-162.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-521.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2012-69.nasl - Type : ACT_GATHER_INFO
2012-04-12 Name : The remote Fedora host is missing a security update.
File : fedora_2012-4871.nasl - Type : ACT_GATHER_INFO
2012-04-09 Name : The remote Fedora host is missing a security update.
File : fedora_2012-4997.nasl - Type : ACT_GATHER_INFO
2012-04-09 Name : The remote Fedora host is missing a security update.
File : fedora_2012-5035.nasl - Type : ACT_GATHER_INFO
2012-03-13 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2432.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077004.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077023.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077782.html
http://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html
http://secunia.com/advisories/48317
http://secunia.com/advisories/50277
http://www.debian.org/security/2012/dsa-2432
http://www.openwall.com/lists/oss-security/2012/03/09/6
http://www.openwall.com/lists/oss-security/2012/03/10/4
http://www.securityfocus.com/bid/52381
https://bugzilla.redhat.com/show_bug.cgi?id=801738
https://exchange.xforce.ibmcloud.com/vulnerabilities/73856
https://rt.cpan.org/Public/Bug/Display.html?id=46507
https://rt.cpan.org/Public/Bug/Display.html?id=75365
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2024-11-28 23:00:09
  • Multiple Updates
2024-11-28 12:29:09
  • Multiple Updates
2021-05-04 12:19:25
  • Multiple Updates
2021-04-22 01:23:08
  • Multiple Updates
2020-05-23 00:33:07
  • Multiple Updates
2017-08-29 09:23:44
  • Multiple Updates
2015-03-18 09:25:56
  • Multiple Updates
2015-02-21 13:24:13
  • Multiple Updates
2014-06-14 13:32:32
  • Multiple Updates
2014-02-17 11:08:47
  • Multiple Updates
2013-05-10 22:35:03
  • Multiple Updates
2013-04-03 13:19:18
  • Multiple Updates