call-cc CHICKEN 4.12.0

CPE Details

call-cc CHICKEN 4.12.0
4.12.0
2019-06-18
11h19 +00:00
2019-06-18
11h19 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:call-cc:chicken:4.12.0:-:*:*:*:*:*:*

Informations

Vendor

call-cc

Product

chicken

Version

4.12.0

Update

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2017-11343 2017-07-16 19h00 +00:00 Due to an incomplete fix for CVE-2012-6125, all versions of CHICKEN Scheme up to and including 4.12.0 are vulnerable to an algorithmic complexity attack. An attacker can provide crafted input which, when inserted into the symbol table, will result in O(n) lookup time.
7.5
High
CVE-2017-9334 2017-06-01 02h53 +00:00 An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
7.5
High
CVE-2017-6949 2017-03-16 16h00 +00:00 An issue was discovered in CHICKEN Scheme through 4.12.0. When using a nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in unmanaged memory, the vector size would be used in unsanitised form as an argument to malloc(). With an unexpected size, the impact may have been a segfault or buffer overflow.
8.1
High