Vulnerability Name:

CVE-2017-18640 (CCN-174331)

Assigned:2017-05-12
Published:2017-05-12
Updated:2023-05-21
Summary:SnakeYAML is vulnerable to a denial of service, caused by an entity expansion in Alias feature during a load operation. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
7.6 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H)
6.7 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2017-18640

Source: CCN
Type: Bitbucket Web site
Allow configuration for preventing billion laughs attack

Source: cve@mitre.org
Type: Exploit, Issue Tracking, Patch, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Exploit, Issue Tracking, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Release Notes, Third Party Advisory
cve@mitre.org

Source: XF
Type: UNKNOWN
snakeyaml-cve201718640-dos(174331)

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Patch, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Patch, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Mailing List, Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: Third Party Advisory
cve@mitre.org

Source: cve@mitre.org
Type: UNKNOWN
cve@mitre.org

Source: CCN
Type: IBM Security Bulletin 6198380 (DB2 for Linux- UNIX and Windows)
Multiple vulnerabilities in dependent libraries affect IBM Db2 leading to denial of service or privilege escalation.

Source: CCN
Type: IBM Security Bulletin 6210366 (Monitoring)
Multiple vulnerabilities have been identified in DB2 that affect the IBM Performance Management product

Source: CCN
Type: IBM Security Bulletin 6262309 (Business Automation Workflow)
vulnerability in snakeyaml might affect IBM Business Automation Workflow and IBM Business Process Manager (BPM) - CVE-2017-18640

Source: CCN
Type: IBM Security Bulletin 6413413 (Dependency Based Build)
Vulnerability has been identified in SnakeYAML used by IBM Dependency Based Build

Source: CCN
Type: IBM Security Bulletin 6444895 (Db2 Warehouse)
IBM Db2 Warehouse has released a fix in response to multiple vulnerabilities found in IBM Db2

Source: CCN
Type: IBM Security Bulletin 6449664 (QRadar SIEM)
IBM QRadar SIEM is vulnerable to using components with known vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6466365 (DB2 for Linux, UNIX and Windows)
Multiple vulnerabilities in dependent libraries affect IBM Db2 leading to denial of service or privilege escalation.

Source: CCN
Type: IBM Security Bulletin 6565389 (WebSphere Service Registry and Repository)
Multiple vulnerabilities in WebSphere Service Registry and Repository in packages such as Apache Struts and Node.js

Source: CCN
Type: IBM Security Bulletin 6570915 (Data Risk Manager)
IBM Data Risk Manager is affected by multiple vulnerabilities including a remote code execution in Spring Framework (CVE-2022-22965)

Source: CCN
Type: IBM Security Bulletin 6597241 (Cognos Analytics)
IBM Cognos Analytics has addressed multiple vulnerabilities

Source: CCN
Type: Oracle Critical Patch Update Advisory - April 2021
Oracle Critical Patch Update Advisory - April 2021

Source: cve@mitre.org
Type: Patch, Third Party Advisory
cve@mitre.org

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:snakeyaml_project:snakeyaml:1.18:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:websphere_service_registry_and_repository:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:11.1:*:*:*:*:linux:*:*
  • OR cpe:/a:ibm:db2:11.1:*:*:*:*:unix:*:*
  • OR cpe:/a:ibm:db2:11.1:*:*:*:*:windows:*:*
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:monitoring:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_process_manager:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:11.1:*:*:*:*:linux:*:*
  • OR cpe:/a:ibm:db2:11.1:*:*:*:*:unix:*:*
  • OR cpe:/a:ibm:db2:11.1:*:*:*:*:windows:*:*
  • OR cpe:/a:ibm:db2:11.5:*:*:*:*:linux:*:*
  • OR cpe:/a:ibm:db2:11.5:*:*:*:*:unix:*:*
  • OR cpe:/a:ibm:db2:11.5:*:*:*:*:windows:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:18.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:19.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:11.5:*:*:*:*:linux:*:*
  • OR cpe:/a:ibm:db2:11.5:*:*:*:*:unix:*:*
  • OR cpe:/a:ibm:db2:11.5:*:*:*:*:windows:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.2.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:8065
    P
    snakeyaml-1.33-150200.3.12.4 on GA media (Moderate)
    2023-06-20
    oval:org.opensuse.security:def:95271
    P
    Security update for ncurses (Moderate) (in QA)
    2022-07-18
    oval:org.opensuse.security:def:3428
    P
    apache-commons-daemon-1.0.15-6.10 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:95058
    P
    snakeyaml-1.28-3.5.1 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:94891
    P
    cups-pk-helper-0.2.6-150400.12.12 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:6041
    P
    Security update for poppler (Moderate)
    2022-05-18
    oval:org.opensuse.security:def:101984
    P
    Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3) (Important)
    2022-04-25
    oval:org.opensuse.security:def:101604
    P
    Security update for aide (Important)
    2022-01-21
    oval:org.opensuse.security:def:113445
    P
    snakeyaml-1.28-2.2 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:106845
    P
    snakeyaml-1.28-2.2 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:97035
    P
    rsyslog-module-gssapi-8.33.1-3.9.1 on GA media (Moderate)
    2021-09-21
    oval:org.opensuse.security:def:4482
    P
    Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP5) (Important)
    2021-09-16
    oval:org.opensuse.security:def:111569
    P
    Security update for snakeyaml (Important)
    2021-07-11
    oval:org.opensuse.security:def:95978
    P
    Security update for snakeyaml (Important)
    2021-06-15
    oval:org.opensuse.security:def:91689
    P
    Security update for snakeyaml (Important)
    2021-06-15
    oval:org.opensuse.security:def:111427
    P
    Security update for snakeyaml (Important)
    2021-06-08
    oval:org.opensuse.security:def:66812
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:117784
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:101779
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:76198
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:94170
    P
    (Important)
    2021-06-07
    oval:org.opensuse.security:def:99955
    P
    (Important)
    2021-06-07
    oval:org.opensuse.security:def:67130
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:74639
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:65571
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:4552
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:94382
    P
    (Important)
    2021-06-07
    oval:org.opensuse.security:def:100290
    P
    (Important)
    2021-06-07
    oval:org.opensuse.security:def:74709
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:108270
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:93744
    P
    (Important)
    2021-06-07
    oval:org.opensuse.security:def:65641
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:5723
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:100619
    P
    (Important)
    2021-06-07
    oval:org.opensuse.security:def:75880
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:108650
    P
    Security update for snakeyaml (Important)
    2021-06-07
    oval:org.opensuse.security:def:93959
    P
    (Important)
    2021-06-07
    oval:com.redhat.rhsa:def:20204807
    P
    RHSA-2020:4807: prometheus-jmx-exporter security update (Moderate)
    2020-11-04
    oval:com.ubuntu.disco:def:2017186400000000
    V
    CVE-2017-18640 on Ubuntu 19.04 (disco) - medium.
    2019-12-12
    oval:com.ubuntu.bionic:def:2017186400000000
    V
    CVE-2017-18640 on Ubuntu 18.04 LTS (bionic) - medium.
    2019-12-12
    oval:com.ubuntu.xenial:def:2017186400000000
    V
    CVE-2017-18640 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-12-12
    BACK
    snakeyaml_project snakeyaml 1.18
    ibm websphere service registry and repository 8.5
    ibm db2 11.1
    ibm db2 11.1
    ibm db2 11.1
    oracle peoplesoft enterprise peopletools 8.56
    ibm monitoring 8.1.4
    ibm business process manager 8.6
    ibm qradar security information and event manager 7.3
    oracle peoplesoft enterprise peopletools 8.57
    ibm db2 11.1
    ibm db2 11.1
    ibm db2 11.1
    ibm db2 11.5
    ibm db2 11.5
    ibm db2 11.5
    ibm qradar security information and event manager 7.4 -
    ibm business automation workflow 18.0
    ibm business automation workflow 19.0
    ibm db2 11.5
    ibm db2 11.5
    ibm db2 11.5
    ibm cognos analytics 11.2.0
    ibm cognos analytics 11.1.7
    ibm cognos analytics 11.2.1