CVE-2012-6122
https://notcve.org/view.php?id=CVE-2012-6122
Buffer overflow in the thread scheduler in Chicken before 4.8.0.1 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. Un desbordamiento de búfer en el programador de subprocesos (hilos) en Chicken versiones anteriores a 4.8.0.1, permite a atacantes causar una denegación de servicio (bloqueo) mediante la apertura de un descriptor de archivo con un valor entero grande. • http://lists.gnu.org/archive/html/chicken-announce/2013-10/msg00000.html http://www.openwall.com/lists/oss-security/2013/02/08/2 http://www.openwall.com/lists/oss-security/2013/05/08/3 http://www.openwall.com/lists/oss-security/2013/05/09/1 https://access.redhat.com/security/cve/cve-2012-6122 https://lists.nongnu.org/archive/html/chicken-hackers/2012-11/msg00075.html https://lists.nongnu.org/archive/html/chicken-users/2012-06/msg00031.html https://security-tra • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2013-2075
https://notcve.org/view.php?id=CVE-2013-2075
Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken through 4.8.0.3 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. NOTE: this issue exists because of an incomplete fix for CVE-2012-6122. Múltiples desbordamientos del búfer en los procedimientos (1) R5RS char-ready, (2) tcp-accept-ready y (3) file-select en Chicken versiones hasta 4.8.0.3, permiten a atacantes causar una denegación de servicio (bloqueo) mediante la apertura de un descriptor de archivo con un valor entero grande. NOTA: este problema se presenta debido a una solución incompleta para CVE-2012-6122. • http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=commitdiff%3Bh=556108092774086b6c86c2e27daf3f740ffec091 http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=commitdiff%3Bh=766056cd5f26b1d529405705449cb534609c113f http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=commitdiff%3Bh=9e2022652258e8a30e5cedbf0abc9cd85a0f6af7 http://www.openwall.com/lists/oss-security/2013/05/11/3 http://www.securityfocus.com/bid/59758 https://exchange.xforce.ibmcloud.com/vulnerabilities/84188 http • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2017-11343
https://notcve.org/view.php?id=CVE-2017-11343
Due to an incomplete fix for CVE-2012-6125, all versions of CHICKEN Scheme up to and including 4.12.0 are vulnerable to an algorithmic complexity attack. An attacker can provide crafted input which, when inserted into the symbol table, will result in O(n) lookup time. Debido a una solución incompleta para el CVE-2012-6125, todas las versiones de CHICKEN Scheme hasta 4.12.0 incluyéndola, son vulnerables a un ataque de complejidad algorítmica. Un atacante puede proporcionar una entrada creada que, cuando sea insertada en la tabla de símbolos, resultará en un tiempo de búsqueda O(n). • http://lists.gnu.org/archive/html/chicken-announce/2017-07/msg00000.html • CWE-407: Inefficient Algorithmic Complexity •
CVE-2017-9334
https://notcve.org/view.php?id=CVE-2017-9334
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it. Un chequeo de "pair" incorrecto en el procedimiento "lenght" de Scheme resulta en una desreferencia de puntero insegura en todas las versiones de CHICKEN Scheme anteriores a 4.13, lo que permite a un atacante causar una denegación de servicio pasando una lista incorrecta a una aplicación que llama a "length". • http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html • CWE-20: Improper Input Validation •
CVE-2017-6949
https://notcve.org/view.php?id=CVE-2017-6949
An issue was discovered in CHICKEN Scheme through 4.12.0. When using a nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in unmanaged memory, the vector size would be used in unsanitised form as an argument to malloc(). With an unexpected size, the impact may have been a segfault or buffer overflow. Se ha descubierto un problema en CHICKEN Scheme hasta la versión 4.12.0. Cuando se utiliza una extensión CHICKEN-specific no estándar para ubicar un vector SRFI-4 en memoria no administrada, el tamaño del vector se usaría de forma no analizada como un argumento a malloc(). • http://lists.gnu.org/archive/html/chicken-announce/2017-03/msg00000.html http://www.securityfocus.com/bid/97317 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •