An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
References
Link | Resource |
---|---|
http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html | Patch Third Party Advisory |
http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html | Patch Third Party Advisory |
Configurations
Information
Published : 2017-05-31 22:29
Updated : 2020-08-05 09:37
NVD link : CVE-2017-9334
Mitre link : CVE-2017-9334
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
call-cc
- chicken