{"id":"AZL-7006","summary":"CVE-2018-20573 affecting package yaml-cpp for versions less than 0.6.2-6","details":"The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.","modified":"2026-04-01T05:21:54.189576Z","published":"2018-12-28T16:29:05Z","upstream":["CVE-2018-20573"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20573"}],"affected":[{"package":{"name":"yaml-cpp","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/yaml-cpp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.6.2-6"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-7006.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}