ALT-PU-2017-1103-1
Closed vulnerabilities
Published: 2017-01-24
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2015-8972
Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.
Severity: CRITICAL (9.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- [bug-gnu-chess] 20151029 Buffer overflow issue in gnuchess
- [bug-gnu-chess] 20151029 Buffer overflow issue in gnuchess
- http://svn.savannah.gnu.org/viewvc/chess?revision=134&view=revision
- http://svn.savannah.gnu.org/viewvc/chess?revision=134&view=revision
- [oss-security] 20161113 CVE needed? / gnuchess 6.2.4 fixed user input buffer overflow
- [oss-security] 20161113 CVE needed? / gnuchess 6.2.4 fixed user input buffer overflow
- [oss-security] 20161114 Re: Re: CVE needed? / gnuchess 6.2.4 fixed user input buffer overflow
- [oss-security] 20161114 Re: Re: CVE needed? / gnuchess 6.2.4 fixed user input buffer overflow
- [oss-security] 20161114 Re: CVE needed? / gnuchess 6.2.4 fixed user input buffer overflow
- [oss-security] 20161114 Re: CVE needed? / gnuchess 6.2.4 fixed user input buffer overflow