An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html | third party advisory patch |
http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html | third party advisory patch |