Stack-Based Buffer Overflow in GNU Chess by The GNU Project
CVE-2019-15767
7.8HIGH
Summary
In GNU Chess version 6.2.5, a severe stack-based buffer overflow vulnerability exists within the cmd_load function located in frontend/cmd.cc. This vulnerability can be exploited by providing a specially crafted chess position within an EPD file, potentially allowing attackers to execute arbitrary code or crash the application. Users and system administrators are advised to apply the recommended patches and updates to mitigate the risks associated with this security flaw.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved