First published: Wed Apr 07 2021(Updated: )
GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Chess | =6.2.7 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
fedoraproject fedora | =32 | |
fedoraproject fedora | =33 | |
fedoraproject fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-30184 is considered a critical vulnerability due to the potential for arbitrary code execution.
To fix CVE-2021-30184, users should update GNU Chess to version 6.2.8 or later.
CVE-2021-30184 affects GNU Chess version 6.2.7 and Fedora versions 32, 33, and 34.
CVE-2021-30184 involves a buffer overflow vulnerability that can be exploited via crafted PGN data.
By exploiting CVE-2021-30184, attackers can execute arbitrary code on affected systems.