Buffer overflow in the thread scheduler in Chicken before 4.8.0.1 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://security-tracker.debian.org/tracker/CVE-2012-6122 | third party advisory |
https://access.redhat.com/security/cve/cve-2012-6122 | broken link |
http://www.openwall.com/lists/oss-security/2013/02/08/2 | third party advisory mailing list |
http://lists.gnu.org/archive/html/chicken-announce/2013-10/msg00000.html | mailing list release notes patch third party advisory |
http://www.openwall.com/lists/oss-security/2013/05/08/3 | mailing list third party advisory patch |
http://www.openwall.com/lists/oss-security/2013/05/09/1 | mailing list third party advisory patch |
https://lists.nongnu.org/archive/html/chicken-users/2012-06/msg00031.html | third party advisory mailing list |
https://lists.nongnu.org/archive/html/chicken-hackers/2012-11/msg00075.html | mailing list third party advisory patch |