Description
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Remediation
References
https://bitbucket.org/snakeyaml/snakeyaml/issues/530/stackoverflow-oss-fuzz-47039
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47039
https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html
https://security.gentoo.org/glsa/202305-28
https://security.netapp.com/advisory/ntap-20240315-0010/
Related Vulnerabilities
CVE-2021-23771 Vulnerability in npm package notevil
CVE-2021-23359 Vulnerability in npm package port-killer
CVE-2020-7754 Vulnerability in maven package org.webjars.npm:npm-user-validate
CVE-2020-14061 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2017-16670 Vulnerability in maven package com.smartbear.soapui:soapui-project