In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.
References
Configurations
History
21 Nov 2024, 04:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZA4UCVURQXNLUNFAMRLZBAFRHSEVC6Q/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TB4FURVE4C35UDXGAAHJL5NIHJQ3WDZT/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGIICRUZRFAK5M7SNHZKR7SKE77SFKWE/ - | |
References | () https://lists.gnu.org/archive/html/bug-gnu-chess/2019-08/msg00004.html - Exploit, Mailing List, Third Party Advisory | |
References | () https://lists.gnu.org/archive/html/bug-gnu-chess/2019-08/msg00005.html - Exploit, Mailing List, Third Party Advisory |
07 Nov 2023, 03:05
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-08-29 03:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15767
Mitre link : CVE-2019-15767
CVE.ORG link : CVE-2019-15767
JSON object : View
Products Affected
gnu
- chess
CWE
CWE-787
Out-of-bounds Write