CVE-2016-6830

Published on: 01/10/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Chicken from Call-cc contain the following vulnerability:

The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trigger a buffer overrun. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).

  • CVE-2016-6830 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
[Chicken-announce] [SECURITY] Buffer overrun in process-execute and proc Patch
Vendor Advisory
lists.nongnu.org
text/html
URL Logo MLIST [chicken-announce] 20160812 [SECURITY] Buffer overrun in process-execute and process-spawn
CHICKEN Buffer Overflow and Information Disclosure Vulnerabilities Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 92550

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCall-ccChickenAllAllAllAll
  • cpe:2.3:a:call-cc:chicken:*:*:*:*:*:*:*:*: