Vulnerabilities > Call CC > Chicken > 4.7.4
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-10-31 | CVE-2013-2075 | Classic Buffer Overflow vulnerability in Call-Cc Chicken Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken through 4.8.0.3 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. | 8.8 |
2019-10-31 | CVE-2012-6125 | Improper Input Validation vulnerability in Call-Cc Chicken Chicken before 4.8.0 is susceptible to algorithmic complexity attacks related to hash table collisions. | 9.8 |
2019-10-31 | CVE-2012-6123 | Improper Input Validation vulnerability in multiple products Chicken before 4.8.0 does not properly handle NUL bytes in certain strings, which allows an attacker to conduct "poisoned NUL byte attack." | 6.5 |
2019-10-31 | CVE-2012-6122 | Classic Buffer Overflow vulnerability in Call-Cc Chicken Buffer overflow in the thread scheduler in Chicken before 4.8.0.1 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. | 7.5 |
2019-10-31 | CVE-2013-2024 | OS Command Injection vulnerability in multiple products OS command injection vulnerability in the "qs" procedure from the "utils" module in Chicken before 4.9.0. | 8.8 |
2017-07-17 | CVE-2017-11343 | Algorithmic Complexity vulnerability in Call-Cc Chicken Due to an incomplete fix for CVE-2012-6125, all versions of CHICKEN Scheme up to and including 4.12.0 are vulnerable to an algorithmic complexity attack. | 7.5 |
2017-06-01 | CVE-2017-9334 | Improper Input Validation vulnerability in Call-Cc Chicken An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it. | 7.5 |
2017-01-10 | CVE-2016-6831 | Resource Exhaustion vulnerability in Call-Cc Chicken The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. | 7.5 |
2017-01-10 | CVE-2016-6830 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Call-Cc Chicken The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. | 9.8 |