CVE-2013-4385

Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
VendorProductVersion
call-ccchicken
𝑥
≤ 4.8.0.4
call-ccchicken
3.0.0
call-ccchicken
3.1.0
call-ccchicken
3.2.0
call-ccchicken
3.3.0
call-ccchicken
3.4.0
call-ccchicken
4.0.0
call-ccchicken
4.1.0
call-ccchicken
4.2.0
call-ccchicken
4.3.0
call-ccchicken
4.4.0
call-ccchicken
4.5.0
call-ccchicken
4.6.0
call-ccchicken
4.7.0
call-ccchicken
4.7.0.6
call-ccchicken
4.8.0
call-ccchicken
4.8.0.1
call-ccchicken
4.8.0.2
call-ccchicken
4.8.0.3
call-ccchicken
𝑥
≤ 4.8.1
call-ccchicken
4.3.3
call-ccchicken
4.3.4
call-ccchicken
4.3.5
call-ccchicken
4.3.6
call-ccchicken
4.3.7
call-ccchicken
4.4.3
call-ccchicken
4.4.4
call-ccchicken
4.4.5
call-ccchicken
4.4.6
call-ccchicken
4.5.2
call-ccchicken
4.5.5
call-ccchicken
4.5.6
call-ccchicken
4.5.7
call-ccchicken
4.6.1
call-ccchicken
4.6.2
call-ccchicken
4.6.3
call-ccchicken
4.6.5
call-ccchicken
4.6.6
call-ccchicken
4.6.7
call-ccchicken
4.7.2
call-ccchicken
4.7.3
call-ccchicken
4.7.4
call-ccchicken
4.8.0:rc1
call-ccchicken
4.8.0:rc2
call-ccchicken
4.8.0:rc3
call-ccchicken
4.8.0:rc4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
chicken
bullseye
5.2.0-2
fixed
wheezy
no-dsa
squeeze
no-dsa
bookworm
5.3.0-1
fixed
sid
5.3.0-2
fixed
trixie
5.3.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
chicken
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
ignored
vivid
ignored
utopic
ignored
trusty
Fixed 4.8.0.5-1
released
saucy
ignored
raring
ignored
quantal
ignored
precise
ignored
lucid
ignored