CHICKEN Scheme Buffer overrun vulnerability

2013.09.27
Credit: Peter Bex
Risk: High
Local: Yes
Remote: No
CWE: CWE-119


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

I'd like to request a CVE for a recently discovered vulnerability in CHICKEN Scheme. It affects a very particular, not very common use of the read-string! procedure. If given a buffer and #f (the Scheme value for "false") as the buffer's size (which should trigger automatic size detection but doesn't), it will read beyond the buffer, until the input port (file, socket, etc) is exhausted. This may result in the typical potential remote code execution or denial of service; in CHICKEN, these buffers are initially allocated on the stack and moved to the heap upon GC. In normal usage, users would usually pass in the buffer's size. This is also the workaround for this bug. For the official announcement, see http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00000.html The discussion thread's final accepted patch is at http://lists.nongnu.org/archive/html/chicken-hackers/2013-09/msg00009.html which got applied as http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git;a=commit;h=cd1b9775005ebe220ba11265dbf5396142e65f26 All versions of CHICKEN prior to 4.8.0.5 and 4.8.3 (not yet released) are affected. Cheers, Peter Bex

References:

http://seclists.org/oss-sec/2013/q3/668
http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00000.html
http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git;a=commit;h=cd1b9775005ebe220ba11265dbf5396142e65f26


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top