Severity
7.8HIGH
EPSS
0.9%
top 24.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 7
Latest updateMar 6

Description

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debiangnuchess< 6.2.7-1+deb11u1+3
NVDgnu/chess6.2.7

Also affects: Fedora 32, 33, 34

Patches

🔴Vulnerability Details

3
GHSA
GHSA-x7m2-6mfm-whq5: GNU Chess 62022-05-24
CVEList
CVE-2021-30184: GNU Chess 62021-04-07
OSV
CVE-2021-30184: GNU Chess 62021-04-07

📋Vendor Advisories

3
Ubuntu
GNU Chess vulnerability2025-03-06
Red Hat
gnuchess: buffer overflows in the cmd_pgnload() and cmd_pgnreplay() functions in frontend/cmd.cc2021-04-04
Debian
CVE-2021-30184: gnuchess - GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Port...2021
CVE-2021-30184 (HIGH CVSS 7.8) | GNU Chess 6.2.7 allows attackers to | cvebase.io