National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2013-2075 Detail

Current Description

Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken through 4.8.0.3 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. NOTE: this issue exists because of an incomplete fix for CVE-2012-6122.

Source:  MITRE
View Analysis Description

Severity



CVSS 3.x Severity and Metrics:

NIST CVSS score
NIST: NVD
Base Score: 8.8 HIGH
Vector:  CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git;a=commitdiff;h=556108092774086b6c86c2e27daf3f740ffec091 Patch Vendor Advisory
http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git;a=commitdiff;h=766056cd5f26b1d529405705449cb534609c113f Patch Vendor Advisory
http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git;a=commitdiff;h=9e2022652258e8a30e5cedbf0abc9cd85a0f6af7 Patch Vendor Advisory
http://www.openwall.com/lists/oss-security/2013/05/11/3 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/59758 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/84188 Third Party Advisory VDB Entry
https://lists.nongnu.org/archive/html/chicken-announce/2013-05/msg00000.html Mailing List Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2013-2075 Third Party Advisory

Weakness Enumeration

CWE-ID CWE Name Source
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') NIST  

Known Affected Software Configurations Switch to CPE 2.2

Configuration 1 ( hide )
 cpe:2.3:a:call-cc:chicken:*:*:*:*:*:*:*:*
     Show Matching CPE(s)
Up to (including)
4.8.0.3


Change History

1 change record found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2013-2075
NVD Published Date:
10/31/2019
NVD Last Modified:
11/06/2019