Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-15767

Опубликовано: 28 авг. 2019
Источник: redhat
CVSS3: 5.3

Описание

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

Отчет

This issue did not affect the versions of gnuchess as shipped with Red Hat Enterprise Linux 6 as the vulnerable code is not present in the older version shipped there.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6gnuchessNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1749175gnuchess: stack-based overflow in cmd_load in frontend/cmd.cc via crafted EPD file

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

CVSS3: 7.8
nvd
больше 6 лет назад

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

CVSS3: 7.8
debian
больше 6 лет назад

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_ ...

github
больше 3 лет назад

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

5.3 Medium

CVSS3