| [Japanese] | 
| JVNDB-2022-000062 | 
| Kaitai Struct: compiler vulnerable to denial-of-service (DoS) | 
|
| 
 
Kaitai Struct: compiler provided by Kaitai team contains SnakeYAML library version 1.25, which is used in parsing .ksy files.SnakeYAML version 1.25 expands recursive aliases unlimitedly (CWE-674), hence Katai Struct: compiler is vulnerable to a denial-of-service (DoS) attack by Billion Laughs Attack.
 
 Taichi Kotake of Sterra Security Co.,Ltd. / Akatsuki Games Inc. reported this vulnerability to IPA.
 JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 | 
|
| 
 
  CVSS V3 Severity:Base Metrics 5.5 (Medium) [IPA Score]
 
    Attack Vector: LocalAttack Complexity: LowPrivileges Required: NoneUser Interaction: RequiredScope: UnchangedConfidentiality Impact: NoneIntegrity Impact: NoneAvailability Impact: High 
  CVSS V2 Severity:Base Metrics 4.3 (Medium) [IPA Score]
 
    Access Vector: NetworkAccess Complexity: MediumAuthentication: NoneConfidentiality Impact: NoneIntegrity Impact: NoneAvailability Impact: Partial 
  
 | 
|
| 
 
	
 | 
| 
 
	Kaitai team
	
		Kaitai Struct: compiler 0.9 and earlier | 
| 
 
	
 | 
|
| 
 
Processing untrusted .ksy files may cause a denial-of-service (DoS) condition.
 | 
|
| 
 
[Update the software]Update the software to the latest version according to the information provided by the developer.
 According to the developer, this vulnerability has been fixed at version 0.10 by updating the bundled SnakeYAML library.
 | 
|
| 
 
	Kaitai team
	
 | 
|
| 
 
	No Mapping(CWE-Other) [IPA Evaluation] | 
|
| 
 
	CVE-2017-18640  | 
|
| 
 
	JVN : JVN#42883072 National Vulnerability Database (NVD) : CVE-2017-18640 Related document : Preventing YAML parsing vulnerabilities with snakeyaml in Java  | 
|
| 
 
	[2022/08/04]Web page was published
 
 |