Vulnerability Details CVE-2013-2075
Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken through 4.8.0.3 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. NOTE: this issue exists because of an incomplete fix for CVE-2012-6122.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 73.3%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 7.5
Products affected by CVE-2013-2075
-
cpe:2.3:a:call-cc:chicken:-
-
cpe:2.3:a:call-cc:chicken:3.0.0
-
cpe:2.3:a:call-cc:chicken:3.1.0
-
cpe:2.3:a:call-cc:chicken:3.2.0
-
cpe:2.3:a:call-cc:chicken:3.3.0
-
cpe:2.3:a:call-cc:chicken:3.4.0
-
cpe:2.3:a:call-cc:chicken:4.0.0
-
cpe:2.3:a:call-cc:chicken:4.1.0
-
cpe:2.3:a:call-cc:chicken:4.2.0
-
cpe:2.3:a:call-cc:chicken:4.3.0
-
cpe:2.3:a:call-cc:chicken:4.3.3
-
cpe:2.3:a:call-cc:chicken:4.3.4
-
cpe:2.3:a:call-cc:chicken:4.3.5
-
cpe:2.3:a:call-cc:chicken:4.3.6
-
cpe:2.3:a:call-cc:chicken:4.3.7
-
cpe:2.3:a:call-cc:chicken:4.4.0
-
cpe:2.3:a:call-cc:chicken:4.4.3
-
cpe:2.3:a:call-cc:chicken:4.4.4
-
cpe:2.3:a:call-cc:chicken:4.4.5
-
cpe:2.3:a:call-cc:chicken:4.4.6
-
cpe:2.3:a:call-cc:chicken:4.5.0
-
cpe:2.3:a:call-cc:chicken:4.5.2
-
cpe:2.3:a:call-cc:chicken:4.5.5
-
cpe:2.3:a:call-cc:chicken:4.5.6
-
cpe:2.3:a:call-cc:chicken:4.5.7
-
cpe:2.3:a:call-cc:chicken:4.6.0
-
cpe:2.3:a:call-cc:chicken:4.6.1
-
cpe:2.3:a:call-cc:chicken:4.6.2
-
cpe:2.3:a:call-cc:chicken:4.6.3
-
cpe:2.3:a:call-cc:chicken:4.6.5
-
cpe:2.3:a:call-cc:chicken:4.6.6
-
cpe:2.3:a:call-cc:chicken:4.6.7
-
cpe:2.3:a:call-cc:chicken:4.7.0
-
cpe:2.3:a:call-cc:chicken:4.7.0.6
-
cpe:2.3:a:call-cc:chicken:4.7.2
-
cpe:2.3:a:call-cc:chicken:4.7.3
-
cpe:2.3:a:call-cc:chicken:4.7.4
-
cpe:2.3:a:call-cc:chicken:4.8.0
-
cpe:2.3:a:call-cc:chicken:4.8.0.1
-
cpe:2.3:a:call-cc:chicken:4.8.0.2
-
cpe:2.3:a:call-cc:chicken:4.8.0.3