{"id":"CVE-2013-4385","details":"Buffer overflow in the \"read-string!\" procedure in the \"extras\" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a \"#f\" value in the NUM argument.","modified":"2026-01-27T04:12:15.444449Z","published":"2013-10-09T14:54:26Z","withdrawn":"2026-01-27T04:12:15.444449Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/55009"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-54"},{"type":"FIX","url":"http://lists.gnu.org/archive/html/chicken-announce/2013-10/msg00000.html"},{"type":"FIX","url":"http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00000.html"},{"type":"WEB","url":"http://lists.nongnu.org/archive/html/chicken-announce/2013-09/msg00001.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/62690"}],"schema_version":"1.7.3"}