Vulnerability CVE-2013-4385


Published: 2013-10-09   Modified: 2013-10-11

Description:
Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.

See advisories in our WLB2 database:
Topic
Author
Date
High
CHICKEN Scheme Buffer overrun vulnerability
Peter Bex
27.09.2013

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Call-cc -> Chicken 

 References:
http://lists.gnu.org/archive/html/chicken-announce/2013-10/msg00000.html
http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00000.html
http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00001.html
http://www.securityfocus.com/bid/62690
https://security.gentoo.org/glsa/201612-54

Copyright 2024, cxsecurity.com

 

Back to Top