Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable prior to 4.8.0.5 and development snapshots prior to 4.8.3 allows remote malicious users to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
call-cc chicken 3.0.0 |
||
call-cc chicken 4.7.0 |
||
call-cc chicken 4.8.0.1 |
||
call-cc chicken 4.8.0.2 |
||
call-cc chicken 4.4.0 |
||
call-cc chicken 4.0.0 |
||
call-cc chicken 4.3.0 |
||
call-cc chicken 4.1.0 |
||
call-cc chicken 4.8.0.3 |
||
call-cc chicken 4.8.0 |
||
call-cc chicken 4.7.0.6 |
||
call-cc chicken 3.4.0 |
||
call-cc chicken 3.2.0 |
||
call-cc chicken 4.6.0 |
||
call-cc chicken 4.5.0 |
||
call-cc chicken 4.2.0 |
||
call-cc chicken |
||
call-cc chicken 3.3.0 |
||
call-cc chicken 3.1.0 |
||
call-cc chicken 4.3.3 |
||
call-cc chicken 4.6.2 |
||
call-cc chicken 4.7.3 |
||
call-cc chicken 4.6.3 |
||
call-cc chicken 4.5.2 |
||
call-cc chicken 4.5.7 |
||
call-cc chicken 4.3.6 |
||
call-cc chicken 4.3.7 |
||
call-cc chicken 4.4.3 |
||
call-cc chicken 4.5.6 |
||
call-cc chicken 4.7.4 |
||
call-cc chicken 4.3.4 |
||
call-cc chicken 4.5.5 |
||
call-cc chicken 4.6.7 |
||
call-cc chicken 4.4.5 |
||
call-cc chicken 4.6.6 |
||
call-cc chicken 4.6.1 |
||
call-cc chicken 4.4.4 |
||
call-cc chicken 4.6.5 |
||
call-cc chicken 4.3.5 |
||
call-cc chicken 4.4.6 |
||
call-cc chicken 4.7.2 |