6.8
CVSSv2

CVE-2019-15767

Published: 29/08/2019 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu chess 6.2.5

Vendor Advisories

Debian Bug report logs - #936023 CVE-2019-15767 Package: gnuchess; Maintainer for gnuchess is Vincent Legout <vlegout@debianorg>; Source for gnuchess is src:gnuchess (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Thu, 29 Aug 2019 08:33:02 UTC Severity: important Tags: upstream Found i ...
Impact: Moderate Public Date: 2019-08-28 CWE: CWE-20 Bugzilla: 1749175: CVE-2019-15767 gnuchess: stack- ...