Vulnerability Description
In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Chess | 6.2.5 |
Related Weaknesses (CWE)
References
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.gnu.org/archive/html/bug-gnu-chess/2019-08/msg00004.htmlExploitMailing ListThird Party Advisory
- https://lists.gnu.org/archive/html/bug-gnu-chess/2019-08/msg00005.htmlExploitMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.gnu.org/archive/html/bug-gnu-chess/2019-08/msg00004.htmlExploitMailing ListThird Party Advisory
- https://lists.gnu.org/archive/html/bug-gnu-chess/2019-08/msg00005.htmlExploitMailing ListThird Party Advisory
FAQ
What is CVE-2019-15767?
CVE-2019-15767 is a vulnerability with a CVSS score of 7.8 (HIGH). In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.
How severe is CVE-2019-15767?
CVE-2019-15767 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15767?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Chess.