21 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

10 Dec 2022 — egg-compile.scm in CHICKEN 5.x before 5.3.1 allows arbitrary OS command execution during package installation via escape characters in a .egg file. egg-compile.scm en CHICKEN 5.x anterior a 5.3.1 permite la ejecución arbitraria de comandos del Sistema Operativo durante la instalación del paquete mediante caracteres de escape en un archivo .egg. • https://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=blobdiff%3Bf=NEWS%3Bh=54888afff09353093453673c407cabfe76a5ce77%3Bhp=a3fd88a892f82c8353267f50509d018bbb1934b9%3Bhb=670478435a982fc4d1f001ea08669f53d35a51cd%3Bhpb=a08f8f548d772ef410c672ba33a27108d8d434f3 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 16%CPEs: 5EXPL: 0

22 Nov 2019 — Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote attackers to execute arbitrary code via the 'select' function. Un desbordamiento de búfer en CHICKEN versiones 4.9.0 y 4.9.0.1, puede permitir a atacantes remotos ejecutar código arbitrario por medio de la función "select". • http://www.openwall.com/lists/oss-security/2014/09/11/6 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

31 Oct 2019 — Chicken before 4.8.0 is susceptible to algorithmic complexity attacks related to hash table collisions. Chicken versiones anteriores a 4.8.0, es susceptible a ataques de complejidad algorítmica relacionados con colisiones de tablas hash. • http://www.openwall.com/lists/oss-security/2013/02/08/2 • CWE-20: Improper Input Validation •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

31 Oct 2019 — A casting error in Chicken before 4.8.0 on 64-bit platform caused the random number generator to return a constant value. NOTE: the vendor states "This function wasn't used for security purposes (and is advertised as being unsuitable)." Un error de conversión en Chicken versiones anteriores a 4.8.0, en la plataforma de 64 bits causó que el generador de números aleatorios devolviera un valor constante. NOTA: el proveedor declara "This function wasn't used for security purposes (and is advertised as being uns... • http://www.openwall.com/lists/oss-security/2013/02/08/2 • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

31 Oct 2019 — Chicken before 4.8.0 does not properly handle NUL bytes in certain strings, which allows an attacker to conduct "poisoned NUL byte attack." Chicken versiones anteriores a 4.8.0, no maneja apropiadamente los bytes NUL en determinadas cadenas, lo que permite a un atacante conducir un "poisoned NUL byte attack." • http://www.openwall.com/lists/oss-security/2013/02/08/2 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

31 Oct 2019 — Buffer overflow in the thread scheduler in Chicken before 4.8.0.1 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. Un desbordamiento de búfer en el programador de subprocesos (hilos) en Chicken versiones anteriores a 4.8.0.1, permite a atacantes causar una denegación de servicio (bloqueo) mediante la apertura de un descriptor de archivo con un valor entero grande. • http://lists.gnu.org/archive/html/chicken-announce/2013-10/msg00000.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

31 Oct 2019 — Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken through 4.8.0.3 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. NOTE: this issue exists because of an incomplete fix for CVE-2012-6122. Múltiples desbordamientos del búfer en los procedimientos (1) R5RS char-ready, (2) tcp-accept-ready y (3) file-select en Chicken versiones hasta 4.8.0.3, permiten a atacantes causar una denegació... • http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=commitdiff%3Bh=556108092774086b6c86c2e27daf3f740ffec091 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

16 Jul 2017 — Due to an incomplete fix for CVE-2012-6125, all versions of CHICKEN Scheme up to and including 4.12.0 are vulnerable to an algorithmic complexity attack. An attacker can provide crafted input which, when inserted into the symbol table, will result in O(n) lookup time. Debido a una solución incompleta para el CVE-2012-6125, todas las versiones de CHICKEN Scheme hasta 4.12.0 incluyéndola, son vulnerables a un ataque de complejidad algorítmica. Un atacante puede proporcionar una entrada creada que, cuando sea ... • http://lists.gnu.org/archive/html/chicken-announce/2017-07/msg00000.html • CWE-407: Inefficient Algorithmic Complexity •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

07 Jun 2017 — Directory traversal vulnerability in Spiffy before 5.4. Vulnerabilidad de tipo salto de directorio en Spiffy en versiones anteriores a la 5.4 • http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=commit%3Bh=edd4926bb4f4c97760a0e03b0d0e8210398fe967 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

01 Jun 2017 — An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it. Un chequeo de "pair" incorrecto en el procedimiento "lenght" de Scheme resulta en una desreferencia de puntero insegura en todas las versiones de CHICKEN Scheme anteriores a 4.13, lo que permite a un atacante causar una denegación de serv... • http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html • CWE-20: Improper Input Validation •