Vulnerabilities > Call CC > Chicken > 4.8.0.1

DATE CVE VULNERABILITY TITLE RISK
2019-10-31 CVE-2013-2075 Classic Buffer Overflow vulnerability in Call-Cc Chicken
Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken through 4.8.0.3 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value.
network
low complexity
call-cc CWE-120
8.8
2019-10-31 CVE-2013-2024 OS Command Injection vulnerability in multiple products
OS command injection vulnerability in the "qs" procedure from the "utils" module in Chicken before 4.9.0.
network
low complexity
call-cc debian CWE-78
critical
9.0
2017-07-17 CVE-2017-11343 Algorithmic Complexity vulnerability in Call-Cc Chicken
Due to an incomplete fix for CVE-2012-6125, all versions of CHICKEN Scheme up to and including 4.12.0 are vulnerable to an algorithmic complexity attack.
network
low complexity
call-cc CWE-407
5.0
2017-06-01 CVE-2017-9334 Improper Input Validation vulnerability in Call-Cc Chicken
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
network
low complexity
call-cc CWE-20
5.0
2017-01-10 CVE-2016-6831 Resource Exhaustion vulnerability in Call-Cc Chicken
The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak.
network
low complexity
call-cc CWE-400
5.0
2017-01-10 CVE-2016-6830 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Call-Cc Chicken
The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call.
network
low complexity
call-cc CWE-119
7.5
2013-10-09 CVE-2013-4385 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Call-Cc Chicken
Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.
network
low complexity
call-cc CWE-119
7.5