
CVE-2014-6310
https://notcve.org/view.php?id=CVE-2014-6310
22 Nov 2019 — Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote attackers to execute arbitrary code via the 'select' function. Un desbordamiento de búfer en CHICKEN versiones 4.9.0 y 4.9.0.1, puede permitir a atacantes remotos ejecutar código arbitrario por medio de la función "select". • http://www.openwall.com/lists/oss-security/2014/09/11/6 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2017-11343
https://notcve.org/view.php?id=CVE-2017-11343
16 Jul 2017 — Due to an incomplete fix for CVE-2012-6125, all versions of CHICKEN Scheme up to and including 4.12.0 are vulnerable to an algorithmic complexity attack. An attacker can provide crafted input which, when inserted into the symbol table, will result in O(n) lookup time. Debido a una solución incompleta para el CVE-2012-6125, todas las versiones de CHICKEN Scheme hasta 4.12.0 incluyéndola, son vulnerables a un ataque de complejidad algorítmica. Un atacante puede proporcionar una entrada creada que, cuando sea ... • http://lists.gnu.org/archive/html/chicken-announce/2017-07/msg00000.html • CWE-407: Inefficient Algorithmic Complexity •

CVE-2017-9334
https://notcve.org/view.php?id=CVE-2017-9334
01 Jun 2017 — An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it. Un chequeo de "pair" incorrecto en el procedimiento "lenght" de Scheme resulta en una desreferencia de puntero insegura en todas las versiones de CHICKEN Scheme anteriores a 4.13, lo que permite a un atacante causar una denegación de serv... • http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html • CWE-20: Improper Input Validation •

CVE-2016-6830
https://notcve.org/view.php?id=CVE-2016-6830
10 Jan 2017 — The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trigger a buffer overrun. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released). Los procedimientos "process-execute" y "process-spawn" en CHICKEN Scheme utilizaron búfers de tamaño fijo para man... • http://lists.nongnu.org/archive/html/chicken-announce/2016-08/msg00001.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-6831
https://notcve.org/view.php?id=CVE-2016-6831
10 Jan 2017 — The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released). Los procedimientos "process-execute" y "process-spawn" no liberan correctamente la memoria cuando falla la llamada execve(), resultando en una perdida de m... • http://lists.nongnu.org/archive/html/chicken-announce/2016-08/msg00001.html • CWE-400: Uncontrolled Resource Consumption •

CVE-2014-9651 – Gentoo Linux Security Advisory 201612-54
https://notcve.org/view.php?id=CVE-2014-9651
28 Aug 2015 — Buffer overflow in CHICKEN 4.9.0.x before 4.9.0.2, 4.9.x before 4.9.1, and before 5.0 allows attackers to have unspecified impact via a positive START argument to the "substring-index[-ci] procedures." Vulnerabilidad de desbordamiento de Buffer en CHICKEN 4.9.0.x en versiones anteriores a 4.9.0.2, 4.9.x en versiones anteriores a 4.9.1 y en versiones anteriores a 5.0, permite a atacantes tener un impacto no especificado a través de un argumento START positivo a 'substring-index[-ci] procedures'. Multiple vul... • http://lists.nongnu.org/archive/html/chicken-hackers/2014-12/msg00000.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •