GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.
References
Configurations
History
07 Nov 2023, 03:33
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
16 May 2022, 20:26
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 May 2021, 13:35
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QC74RWMDLSQGV6Z3ZABNTPABB33S4YNF/ - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXOTMUSBVUZNA3JMPG6BU37DQW2YOJWS/ - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOGPLC77ZL2FACSOE5MWDS3YH3RBNQAQ/ - Third Party Advisory | |
References | (MISC) https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html - Exploit, Mailing List, Patch, Vendor Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* |
24 Apr 2021, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Apr 2021, 18:40
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QC74RWMDLSQGV6Z3ZABNTPABB33S4YNF/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXOTMUSBVUZNA3JMPG6BU37DQW2YOJWS/ - Mailing List, Third Party Advisory |
16 Apr 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Apr 2021, 14:33
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.8 |
CWE | CWE-120 | |
References | (MISC) https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html - Exploit, Mailing List, Vendor Advisory | |
References | (MISC) https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html - Exploit, Mailing List, Vendor Advisory | |
CPE | cpe:2.3:a:gnu:chess:6.2.7:*:*:*:*:*:*:* |
07 Apr 2021, 12:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-04-07 12:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-30184
Mitre link : CVE-2021-30184
CVE.ORG link : CVE-2021-30184
JSON object : View
Products Affected
fedoraproject
- fedora
gnu
- chess
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')