Vulnerabilities (CVE)

Filtered by vendor Call-cc Subscribe
Filtered by product Chicken
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2014-6310 2 Call-cc, Debian 2 Chicken, Debian Linux 2019-11-25 7.5 HIGH 9.8 CRITICAL
Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote attackers to execute arbitrary code via the 'select' function.
CVE-2012-6125 1 Call-cc 1 Chicken 2019-11-05 7.5 HIGH 9.8 CRITICAL
Chicken before 4.8.0 is susceptible to algorithmic complexity attacks related to hash table collisions.
CVE-2016-6830 1 Call-cc 1 Chicken 2017-01-11 7.5 HIGH 9.8 CRITICAL
The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trigger a buffer overrun. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).