Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-4385

Опубликовано: 09 окт. 2013
Источник: ubuntu
Приоритет: high
CVSS2: 7.5

Описание

Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.

РелизСтатусПримечание
devel

not-affected

4.8.0.5-1
esm-apps/xenial

not-affected

4.8.0.5-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.8.0.5-1]]
lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

end of life
trusty

released

4.8.0.5-1

Показывать по

7.5 High

CVSS2

Связанные уязвимости

nvd
больше 12 лет назад

Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.

debian
больше 12 лет назад

Buffer overflow in the "read-string!" procedure in the "extras" unit i ...

github
больше 3 лет назад

Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.

7.5 High

CVSS2