GNU Chess Local Buffer Overflow...

- AV AC AU C I A
发布: 2003-07-03
修订: 2025-04-13

A local buffer overflow has been reported for GNU Chess that may result in an attacker obtaining elevated privileges. The vulnerability exists due to insufficient boundary checks performed on some commandline options. Successful exploitation may result in the execution of attacker-supplied code. To be exploited for elevated privileges, the software must be setuid or setgid. Since GNU Chess is used as a back-end for some chess-related software, a situation could arise where it is invoked with user-supplied arguments by another program.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息