CVE-2013-2075

Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken through 4.8.0.3 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. NOTE: this issue exists because of an incomplete fix for CVE-2012-6122.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
VendorProductVersion
call-ccchicken
𝑥
≤ 4.8.0.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
chicken
bullseye
5.2.0-2
fixed
bookworm
5.3.0-1
fixed
sid
5.3.0-2
fixed
trixie
5.3.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
chicken
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
dne
saucy
not-affected
raring
ignored
quantal
ignored
precise
ignored
lucid
ignored