Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x7m2-6mfm-whq5

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

EPSS

Процентиль: 72%
0.0071
Низкий

7.8 High

CVSS3

Дефекты

CWE-120

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 5 лет назад

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

CVSS3: 7.8
redhat
почти 5 лет назад

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

CVSS3: 7.8
nvd
почти 5 лет назад

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

CVSS3: 7.8
debian
почти 5 лет назад

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted ...

EPSS

Процентиль: 72%
0.0071
Низкий

7.8 High

CVSS3

Дефекты

CWE-120