[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2016-6830 -- chicken

ID: oval:org.secpod.oval:def:2001203Date: (C)2019-06-03   (M)2023-12-20
Class: VULNERABILITYFamily: unix




The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve call. This would allow user-supplied argument/environment variable lists to trigger a buffer overrun. This affects all releases of CHICKEN up to and including 4.11 .

Platform:
Debian 8.x
Debian 9.x
Product:
libchicken-dev
Reference:
CVE-2016-6830
CVE    1
CVE-2016-6830
CPE    3
cpe:/o:debian:debian_linux:8.x
cpe:/o:debian:debian_linux:9.x
cpe:/a:call-cc:libchicken-dev

© SecPod Technologies