CVE-2026-4177

Published: Mar 17, 2026 Last Modified: Mar 17, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

YAML::Syck versions through 1.36 for Perl has several potential security vulnerabilities including a high-severity heap buffer overflow in the YAML emitter.

The heap overflow occurs when class names exceed the initial 512-byte allocation.

The base64 decoder could read past the buffer end on trailing newlines.

strtok mutated n->type_id in place, corrupting shared node data.

A memory leak occurred in syck_hdlr_add_anchor when a node already had an anchor. The incoming anchor string 'a' was leaked on early return.

122

Heap-based Buffer Overflow

Draft
Common Consequences
Security Scopes Affected:
Availability Integrity Confidentiality Access Control Other
Potential Impacts:
Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Execute Unauthorized Code Or Commands Bypass Protection Mechanism Modify Memory Other
Applicable Platforms
Languages: C, C++, Memory-Unsafe
View CWE Details
https://github.com/cpan-authors/YAML-Syck/commit/e8844a31c8cf0052914b198fc784ed…
https://metacpan.org/release/TODDR/YAML-Syck-1.37_01/changes#L21
http://www.openwall.com/lists/oss-security/2026/03/16/6