Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-4385

Опубликовано: 09 окт. 2013
Источник: nvd
CVSS2: 7.5
EPSS Низкий

Описание

Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:call-cc:chicken:*:*:*:*:*:*:*:*
Версия до 4.8.0.4 (включая)
cpe:2.3:a:call-cc:chicken:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.7.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.8.0:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.8.0.2:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.8.0.3:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:call-cc:chicken:*:*:*:*:*:*:*:*
Версия до 4.8.1 (включая)
cpe:2.3:a:call-cc:chicken:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.4.4:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.5.5:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.5.6:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.5.7:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.6.3:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.6.5:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.6.6:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.6.7:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.7.2:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.7.3:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.7.4:*:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:call-cc:chicken:4.8.0:rc4:*:*:*:*:*:*

EPSS

Процентиль: 86%
0.02706
Низкий

7.5 High

CVSS2

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 12 лет назад

Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.

debian
больше 12 лет назад

Buffer overflow in the "read-string!" procedure in the "extras" unit i ...

github
больше 3 лет назад

Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.

EPSS

Процентиль: 86%
0.02706
Низкий

7.5 High

CVSS2

Дефекты

CWE-119