{
  "threat_severity" : "Important",
  "public_date" : "2014-03-27T00:00:00Z",
  "bugzilla" : {
    "description" : "libyaml: heap-based buffer overflow when parsing URLs",
    "id" : "1078083",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1078083"
  },
  "cvss" : {
    "cvss_base_score" : "6.8",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cwe" : "CWE-122",
  "details" : [ "Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.", "A heap based buffer overflow exists in the libyaml package such that an attacker by supplying a specially crafted yaml document when parsed by the application might result in remote code execution leading to complete compromise of the system." ],
  "statement" : "Redhat satellite does not ship libyaml package but instead consumes the package from the RHEL distribution which is why it has been marked as not affected.",
  "acknowledgement" : "Red Hat would like to thank oCERT for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "OpenStack 3 for RHEL 6",
    "release_date" : "2014-04-02T00:00:00Z",
    "advisory" : "RHSA-2014:0353",
    "cpe" : "cpe:/a:redhat:openstack:3::el6",
    "package" : "libyaml-0:0.1.3-1.4.el6"
  }, {
    "product_name" : "OpenStack 3 for RHEL 6",
    "release_date" : "2014-04-03T00:00:00Z",
    "advisory" : "RHSA-2014:0364",
    "cpe" : "cpe:/a:redhat:openstack:3::el6",
    "package" : "ruby193-libyaml-0:0.1.4-5.1.el6"
  }, {
    "product_name" : "OpenStack 4 for RHEL 6",
    "release_date" : "2014-04-02T00:00:00Z",
    "advisory" : "RHSA-2014:0354",
    "cpe" : "cpe:/a:redhat:openstack:4::el6",
    "package" : "libyaml-0:0.1.3-1.4.el6"
  }, {
    "product_name" : "Red Hat Common for RHEL 6",
    "release_date" : "2014-04-17T00:00:00Z",
    "advisory" : "RHSA-2014:0415",
    "cpe" : "cpe:/a:redhat:rhel_common:6::el6",
    "package" : "libyaml-0:0.1.3-1.4.el6"
  }, {
    "product_name" : "Red Hat Software Collections for RHEL-6",
    "release_date" : "2014-04-02T00:00:00Z",
    "advisory" : "RHSA-2014:0355",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:1::el6",
    "package" : "ruby193-libyaml-0:0.1.4-5.1.el6"
  } ],
  "package_state" : [ {
    "product_name" : "CloudForms Management Engine 5",
    "fix_state" : "Not affected",
    "package_name" : "ruby193-libyaml",
    "cpe" : "cpe:/a:redhat:cloudforms_managementengine:5"
  }, {
    "product_name" : "OpenShift Enterprise 1",
    "fix_state" : "Will not fix",
    "package_name" : "ruby193-libyaml",
    "cpe" : "cpe:/a:redhat:openshift:1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Affected",
    "package_name" : "libyaml",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "libyaml",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise MRG 1",
    "fix_state" : "Will not fix",
    "package_name" : "libyaml",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:1"
  }, {
    "product_name" : "Red Hat Enterprise MRG 2",
    "fix_state" : "Will not fix",
    "package_name" : "libyaml",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2"
  }, {
    "product_name" : "Red Hat Satellite 5",
    "fix_state" : "Not affected",
    "package_name" : "libyaml",
    "cpe" : "cpe:/a:redhat:network_satellite:5"
  }, {
    "product_name" : "Red Hat Satellite 6",
    "fix_state" : "Not affected",
    "package_name" : "libyaml",
    "cpe" : "cpe:/a:redhat:satellite:6"
  }, {
    "product_name" : "Red Hat Software Collections",
    "fix_state" : "Not affected",
    "package_name" : "libyaml",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:1"
  }, {
    "product_name" : "Red Hat Subscription Asset Manager",
    "fix_state" : "Affected",
    "package_name" : "libyaml",
    "cpe" : "cpe:/a:rhel_sam:1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2014-2525\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-2525" ],
  "name" : "CVE-2014-2525",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}