Описание
Buffer overflow in the "read-u8vector!" procedure in the srfi-4 unit in CHICKEN stable 4.8.0.7 and development snapshots before 4.9.1 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 4.10.0-1 |
| bionic | not-affected | 4.10.0-1 |
| cosmic | not-affected | 4.10.0-1 |
| devel | not-affected | 4.10.0-1 |
| disco | not-affected | 4.10.0-1 |
| esm-apps/bionic | not-affected | 4.10.0-1 |
| esm-apps/xenial | not-affected | 4.9.0.1-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| lucid | ignored | end of life |
| precise | ignored | end of life |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Buffer overflow in the "read-u8vector!" procedure in the srfi-4 unit in CHICKEN stable 4.8.0.7 and development snapshots before 4.9.1 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.
Buffer overflow in the "read-u8vector!" procedure in the srfi-4 unit i ...
Buffer overflow in the "read-u8vector!" procedure in the srfi-4 unit in CHICKEN stable 4.8.0.7 and development snapshots before 4.9.1 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.
EPSS
7.5 High
CVSS2