CVE-2019-20397
moderate-risk
Published 2020-01-22
A double-free is present in libyang before v1.0-r1 in the function yyparse() when an organization field is not terminated. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
Do I need to act?
-
0.40% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (11)
Libyang
Libyang
Libyang
Libyang
Libyang
Libyang
Libyang
Libyang
Libyang
Libyang
Libyang
Affected Vendors
References (10)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1793928
Third Party Advisory
https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1
Third Party Advisory
https://github.com/CESNET/libyang/issues/739
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1793928
Third Party Advisory
https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1
Third Party Advisory
https://github.com/CESNET/libyang/issues/739
48
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
2/34 · Minimal
Exposure
16/34 · Moderate