CVE-2013-2075
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
31/10/2019
Last modified:
07/11/2023
Description
Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken through 4.8.0.3 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. NOTE: this issue exists because of an incomplete fix for CVE-2012-6122.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:call-cc:chicken:*:*:*:*:*:*:*:* | 4.8.0.3 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba%3Dcommitdiff%3Bh%3D556108092774086b6c86c2e27daf3f740ffec091
- http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba%3Dcommitdiff%3Bh%3D766056cd5f26b1d529405705449cb534609c113f
- http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba%3Dcommitdiff%3Bh%3D9e2022652258e8a30e5cedbf0abc9cd85a0f6af7
- http://www.openwall.com/lists/oss-security/2013/05/11/3
- http://www.securityfocus.com/bid/59758
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84188
- https://lists.nongnu.org/archive/html/chicken-announce/2013-05/msg00000.html
- https://security-tracker.debian.org/tracker/CVE-2013-2075