Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-15767

Опубликовано: 29 авг. 2019
Источник: debian
EPSS Низкий

Описание

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnuchessfixed6.2.7-1package

Примечания

  • https://lists.gnu.org/archive/html/bug-gnu-chess/2019-08/msg00004.html

  • Neutralised by toolchain hardening, no security impact

EPSS

Процентиль: 53%
0.00305
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

CVSS3: 5.3
redhat
больше 6 лет назад

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

CVSS3: 7.8
nvd
больше 6 лет назад

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

github
больше 3 лет назад

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

EPSS

Процентиль: 53%
0.00305
Низкий