Описание
Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 4.8.0.5-1 |
| esm-apps/xenial | not-affected | 4.8.0.5-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.8.0.5-1]] |
| lucid | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| quantal | ignored | end of life |
| raring | ignored | end of life |
| saucy | ignored | end of life |
| trusty | released | 4.8.0.5-1 |
Показывать по
Ссылки на источники
7.5 High
CVSS2
Связанные уязвимости
Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.
Buffer overflow in the "read-string!" procedure in the "extras" unit i ...
Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.
7.5 High
CVSS2