Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-30184

Опубликовано: 07 апр. 2021
Источник: debian

Описание

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnuchessfixed6.2.9-0.1package
gnuchessfixed6.2.7-1+deb12u1bookwormpackage
gnuchessno-dsabusterpackage
gnuchesspostponedstretchpackage

Примечания

  • https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html

  • https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html

  • http://git.savannah.gnu.org/cgit/chess.git/commit/?id=f6a65783ebb41bb87811e57754e65933550a44c0 (v6.2.9-pre1)

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 5 лет назад

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

CVSS3: 7.8
redhat
почти 5 лет назад

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

CVSS3: 7.8
nvd
почти 5 лет назад

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

CVSS3: 7.8
github
больше 3 лет назад

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.