Severity
7.8HIGH
EPSS
0.3%
top 46.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 29
Latest updateMay 24

Description

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debiangnuchess< 6.2.7-1+3
NVDgnu/chess6.2.5

🔴Vulnerability Details

3
GHSA
GHSA-7r53-xj4v-5fr4: In GNU Chess 62022-05-24
CVEList
CVE-2019-15767: In GNU Chess 62019-08-29
OSV
CVE-2019-15767: In GNU Chess 62019-08-29

📋Vendor Advisories

2
Red Hat
gnuchess: stack-based overflow in cmd_load in frontend/cmd.cc via crafted EPD file2019-08-28
Debian
CVE-2019-15767: gnuchess - In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load funct...2019

💬Community

3
Bugzilla
CVE-2019-15767 gnuchess: stack-based overflow in cmd_load in frontend/cmd.cc via crafted EPD file [fedora-all]2019-09-05
Bugzilla
CVE-2019-15767 gnuchess: stack-based overflow in cmd_load in frontend/cmd.cc via crafted EPD file [epel-7]2019-09-05
Bugzilla
CVE-2019-15767 gnuchess: stack-based overflow in cmd_load in frontend/cmd.cc via crafted EPD file2019-09-05