CVE-2019-15767

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 53%
VendorProductVersion
gnuchess
6.2.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gnuchess
sid
6.2.7-1
fixed
trixie
6.2.7-1
fixed
bookworm
6.2.7-1
fixed
bullseye
6.2.7-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gnuchess
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
ignored
focal
needs-triage
eoan
ignored
disco
ignored
bionic
needs-triage
xenial
needs-triage
trusty
dne