Vulnerability Details : CVE-2017-9334
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2017-9334
- cpe:2.3:a:call-cc:chicken:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-9334
0.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-9334
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2017-9334
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-9334
-
http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html
[Chicken-announce] [SECURITY] Potential denial of service due to segfaulPatch;Third Party Advisory
-
http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html
[Chicken-hackers] [PATCH] [SECURITY] Fix segfault in C_i_length() on impPatch;Third Party Advisory
Jump to