7.5
CVSSv2

CVE-2016-8606

Published: 12/01/2017 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The REPL server (--listen) in GNU Guile 2.0.12 allows an malicious user to execute arbitrary code via an HTTP inter-protocol attack.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu guile 2.0.12

fedoraproject fedora 25

fedoraproject fedora 24

fedoraproject fedora 23

Vendor Advisories

Debian Bug report logs - #840555 guile-20: CVE-2016-8606 Package: src:guile-20; Maintainer for src:guile-20 is Rob Browning <rlb@defaultvalueorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 12 Oct 2016 18:39:01 UTC Severity: important Tags: patch, security, upstream Found in versions guile- ...
It was reported that the REPL server is vulnerable to the HTTP inter-protocol attack This constitutes a remote code execution vulnerability for developers running a REPL server that listens on a loopback device or private network Applications that do not run a REPL server, as is usually the case, are unaffected ...