Stack-based Buffer Overflow in libyang Affects Multiple Versions
CVE-2019-19333
8.1HIGH
Summary
A stack-based buffer overflow vulnerability exists in libyang prior to version 1.0-r5, triggered by improper parsing of YANG files containing a leaf of type 'bits'. When an application utilizes libyang to process untrusted YANG files, it becomes susceptible to this flaw. An attacker can exploit this vulnerability to induce a denial of service or potentially execute arbitrary code on the affected system.
Affected Version(s)
libyang libyang all versions before 1.0-r5
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved