CVE-2014-6310
📋 TL;DR
CVE-2014-6310 is a buffer overflow vulnerability in CHICKEN Scheme's 'select' function that allows remote attackers to execute arbitrary code. This affects CHICKEN 4.9.0 and 4.9.0.1 installations. Users running vulnerable versions of CHICKEN Scheme are at risk of complete system compromise.
💻 Affected Systems
- CHICKEN Scheme
📦 What is this software?
Chicken by Call Cc
Chicken by Call Cc
⚠️ Risk & Real-World Impact
Worst Case
Remote unauthenticated attacker gains full control of the system, executes arbitrary code with application privileges, and potentially escalates to root/system privileges.
Likely Case
Remote code execution leading to data theft, system compromise, and lateral movement within the network.
If Mitigated
If properly patched or isolated, impact is limited to denial of service at most.
🎯 Exploit Status
Buffer overflow vulnerabilities in widely used functions like 'select' are frequently weaponized. Public exploit code exists in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.9.0.2 and later
Vendor Advisory: https://lists.nongnu.org/archive/html/chicken-users/2014-08/msg00055.html
Restart Required: Yes
Instructions:
1. Update CHICKEN to version 4.9.0.2 or later using your package manager. 2. Recompile any CHICKEN applications with the updated runtime. 3. Restart affected services.
🔧 Temporary Workarounds
Disable or restrict network access
linuxLimit network exposure of CHICKEN applications to reduce attack surface
iptables -A INPUT -p tcp --dport [PORT] -j DROP
ufw deny [PORT]
🧯 If You Can't Patch
- Isolate vulnerable systems in separate network segments with strict firewall rules
- Implement application-level input validation and sanitization for all 'select' function calls
🔍 How to Verify
Check if Vulnerable:
Check CHICKEN version: chicken --version or csi --version
Check Version:
chicken --version 2>/dev/null || csi --version 2>/dev/null || echo 'CHICKEN not found'
Verify Fix Applied:
Verify version is 4.9.0.2 or later and test 'select' function with boundary cases
📡 Detection & Monitoring
Log Indicators:
- Segmentation faults in CHICKEN processes
- Unusual process spawning from CHICKEN runtime
Network Indicators:
- Unexpected network connections from CHICKEN applications
- Exploit pattern matches in network traffic
SIEM Query:
process:chicken AND (event:segfault OR event:crash) OR process:csi AND event:anomalous_behavior
🔗 References
- http://www.openwall.com/lists/oss-security/2014/09/11/6
- http://www.securityfocus.com/bid/69727
- https://lists.nongnu.org/archive/html/chicken-users/2014-08/msg00055.html
- https://security-tracker.debian.org/tracker/CVE-2014-6310
- http://www.openwall.com/lists/oss-security/2014/09/11/6
- http://www.securityfocus.com/bid/69727
- https://lists.nongnu.org/archive/html/chicken-users/2014-08/msg00055.html
- https://security-tracker.debian.org/tracker/CVE-2014-6310