An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
References
Link | Resource |
---|---|
http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html | Patch Third Party Advisory |
http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html | Patch Third Party Advisory |
http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html | Patch Third Party Advisory |
http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html - Patch, Third Party Advisory | |
References | () http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html - Patch, Third Party Advisory |
Information
Published : 2017-06-01 05:29
Updated : 2024-11-21 03:35
NVD link : CVE-2017-9334
Mitre link : CVE-2017-9334
CVE.ORG link : CVE-2017-9334
JSON object : View
Products Affected
call-cc
- chicken
CWE
CWE-20
Improper Input Validation