Vulnerabilities > GNU > Chess

DATE CVE VULNERABILITY TITLE RISK
2021-04-07 CVE-2021-30184 Classic Buffer Overflow vulnerability in multiple products
GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data.
local
low complexity
gnu fedoraproject CWE-120
7.8
2019-08-29 CVE-2019-15767 Out-of-bounds Write vulnerability in GNU Chess 6.2.5
In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.
local
low complexity
gnu CWE-787
7.8
2017-01-23 CVE-2015-8972 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Chess
Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.
network
low complexity
gnu CWE-119
7.5
2002-05-16 CVE-2002-0204 Buffer Overflow vulnerability in GNU Chess 5.02
Buffer overflow in GNU Chess (gnuchess) 5.02 and earlier, if modified or used in a networked capacity contrary to its own design as a single-user application, may allow local or remote attackers to execute arbitrary code via a long command.
network
low complexity
gnu
7.5