Search
Total
3 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2014-6310 | 2 Call-cc, Debian | 2 Chicken, Debian Linux | 2019-11-25 | 7.5 HIGH | 9.8 CRITICAL |
| Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote attackers to execute arbitrary code via the 'select' function. | |||||
| CVE-2012-6125 | 1 Call-cc | 1 Chicken | 2019-11-05 | 7.5 HIGH | 9.8 CRITICAL |
| Chicken before 4.8.0 is susceptible to algorithmic complexity attacks related to hash table collisions. | |||||
| CVE-2016-6830 | 1 Call-cc | 1 Chicken | 2017-01-11 | 7.5 HIGH | 9.8 CRITICAL |
| The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trigger a buffer overrun. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released). | |||||
