An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
References
Link | Resource |
---|---|
http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html | Patch Third Party Advisory |
http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-06-01 05:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-9334
Mitre link : CVE-2017-9334
CVE.ORG link : CVE-2017-9334
JSON object : View
Products Affected
call-cc
- chicken
CWE
CWE-20
Improper Input Validation