Call-cc

Chicken

18 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.65%
  • Published 29.03.2017 14:59:00
  • Last modified 20.04.2025 01:37:25

The string-translate* procedure in the data-structures unit in CHICKEN before 4.10.0 allows remote attackers to cause a denial of service (crash).

  • EPSS 0.52%
  • Published 16.03.2017 17:59:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered in CHICKEN Scheme through 4.12.0. When using a nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in unmanaged memory, the vector size would be used in unsanitised form as an argument to malloc(). With an unex...

  • EPSS 0.54%
  • Published 10.01.2017 15:59:00
  • Last modified 20.04.2025 01:37:25

The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all re...

  • EPSS 0.49%
  • Published 10.01.2017 15:59:00
  • Last modified 20.04.2025 01:37:25

The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trig...

  • EPSS 0.43%
  • Published 28.08.2015 21:59:00
  • Last modified 12.04.2025 10:46:40

Buffer overflow in CHICKEN 4.9.0.x before 4.9.0.2, 4.9.x before 4.9.1, and before 5.0 allows attackers to have unspecified impact via a positive START argument to the "substring-index[-ci] procedures."

  • EPSS 0.09%
  • Published 29.09.2014 22:55:05
  • Last modified 12.04.2025 10:46:40

Untrusted search path vulnerability in csi in Chicken before 4.8.2 allows local users to execute arbitrary code via a Trojan horse .csirc in the current working directory.

  • EPSS 3.06%
  • Published 20.05.2014 14:55:07
  • Last modified 12.04.2025 10:46:40

Buffer overflow in the "read-u8vector!" procedure in the srfi-4 unit in CHICKEN stable 4.8.0.7 and development snapshots before 4.9.1 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute ...

  • EPSS 2.71%
  • Published 09.10.2013 14:54:26
  • Last modified 11.04.2025 00:51:21

Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly e...