CVE-2017-9334

An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
Configurations

Configuration 1 (hide)

cpe:2.3:a:call-cc:chicken:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:35

Type Values Removed Values Added
References () http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html - Patch, Third Party Advisory () http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html - Patch, Third Party Advisory
References () http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html - Patch, Third Party Advisory () http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html - Patch, Third Party Advisory

Information

Published : 2017-06-01 05:29

Updated : 2024-11-21 03:35


NVD link : CVE-2017-9334

Mitre link : CVE-2017-9334

CVE.ORG link : CVE-2017-9334


JSON object : View

Products Affected

call-cc

  • chicken
CWE
CWE-20

Improper Input Validation