Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8972

Опубликовано: 23 янв. 2017
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnuchessfixed6.2.4-1package

Примечания

  • Built with hardening flags, no security impact

  • http://lists.gnu.org/archive/html/bug-gnu-chess/2015-10/msg00002.html

  • http://svn.savannah.gnu.org/viewvc?view=rev&root=chess&revision=134

EPSS

Процентиль: 85%
0.02387
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.

CVSS3: 7.8
redhat
больше 9 лет назад

Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.

CVSS3: 9.8
nvd
около 9 лет назад

Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.

suse-cvrf
около 9 лет назад

Security update for gnuchess

CVSS3: 9.8
github
больше 3 лет назад

Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.

EPSS

Процентиль: 85%
0.02387
Низкий