CVE-2013-4385
09.10.2013, 14:54
Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.Enginsight
Vendor | Product | Version |
---|---|---|
call-cc | chicken | 𝑥 ≤ 4.8.0.4 |
call-cc | chicken | 3.0.0 |
call-cc | chicken | 3.1.0 |
call-cc | chicken | 3.2.0 |
call-cc | chicken | 3.3.0 |
call-cc | chicken | 3.4.0 |
call-cc | chicken | 4.0.0 |
call-cc | chicken | 4.1.0 |
call-cc | chicken | 4.2.0 |
call-cc | chicken | 4.3.0 |
call-cc | chicken | 4.4.0 |
call-cc | chicken | 4.5.0 |
call-cc | chicken | 4.6.0 |
call-cc | chicken | 4.7.0 |
call-cc | chicken | 4.7.0.6 |
call-cc | chicken | 4.8.0 |
call-cc | chicken | 4.8.0.1 |
call-cc | chicken | 4.8.0.2 |
call-cc | chicken | 4.8.0.3 |
call-cc | chicken | 𝑥 ≤ 4.8.1 |
call-cc | chicken | 4.3.3 |
call-cc | chicken | 4.3.4 |
call-cc | chicken | 4.3.5 |
call-cc | chicken | 4.3.6 |
call-cc | chicken | 4.3.7 |
call-cc | chicken | 4.4.3 |
call-cc | chicken | 4.4.4 |
call-cc | chicken | 4.4.5 |
call-cc | chicken | 4.4.6 |
call-cc | chicken | 4.5.2 |
call-cc | chicken | 4.5.5 |
call-cc | chicken | 4.5.6 |
call-cc | chicken | 4.5.7 |
call-cc | chicken | 4.6.1 |
call-cc | chicken | 4.6.2 |
call-cc | chicken | 4.6.3 |
call-cc | chicken | 4.6.5 |
call-cc | chicken | 4.6.6 |
call-cc | chicken | 4.6.7 |
call-cc | chicken | 4.7.2 |
call-cc | chicken | 4.7.3 |
call-cc | chicken | 4.7.4 |
call-cc | chicken | 4.8.0:rc1 |
call-cc | chicken | 4.8.0:rc2 |
call-cc | chicken | 4.8.0:rc3 |
call-cc | chicken | 4.8.0:rc4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References