Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6830

Опубликовано: 10 янв. 2017
Источник: debian
EPSS Низкий

Описание

The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trigger a buffer overrun. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
chickenfixed4.12.0-0.2package
chickenno-dsastretchpackage
chickenno-dsajessiepackage

Примечания

  • http://lists.nongnu.org/archive/html/chicken-announce/2016-08/msg00001.html

  • https://lists.nongnu.org/archive/html/chicken-hackers/2016-07/txtSWHYeFeG0R.txt

  • http://bugs.call-cc.org/ticket/1308

EPSS

Процентиль: 65%
0.00491
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trigger a buffer overrun. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).

CVSS3: 9.8
nvd
около 9 лет назад

The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trigger a buffer overrun. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).

CVSS3: 9.8
github
больше 3 лет назад

The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trigger a buffer overrun. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).

EPSS

Процентиль: 65%
0.00491
Низкий