|
|
| |
|
| |
chicken: code execution
| Package(s): | chicken |
CVE #(s): | CVE-2013-4385
|
| Created: | September 30, 2013 |
Updated: | October 2, 2013 |
| Description: |
From the Red Hat bugzilla:
Chicken, a compiler for the Scheme programming language, is found to have a buffer overrrun flaw due to the read-string! procedure from the "extras" unit, when used in a particular way.
It was found that there was a missing check for the situation when NUM was at #f (the scheme value for false) in the buffer as the buffer size, then it will read beyond the buffer until the input port is exhausted. This may result in a DoS or a remote code execution.
Though currently all stable releases are vulnerable to this flaw, there is a simple workaround to be used in code that uses read-string!: simply convert all (read-string! #f buf ...) invocations to (read-string! (string-length buf) buf ...) or, if possible, use the non-destructive read-string procedure from the same unit. |
| Alerts: |
|
( Log in to post comments)
|
|
|