ID CVE-2003-0361
Summary gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp.
References
Vulnerable Configurations
  • cpe:2.3:o:debian:debian_linux:0.9.1:*:woody_gps_package:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.1:*:woody_gps_package:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:0.9.2:*:woody_gps_package:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.2:*:woody_gps_package:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:0.9.3:*:woody_gps_package:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.3:*:woody_gps_package:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:0.9.4:*:woody_gps_package:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.4:*:woody_gps_package:*:*:*:*:*
CVSS
Base: 7.5 (as of 05-09-2008 - 20:34)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm http://gps.seul.org/changelog.html
debian DSA-307
Last major update 05-09-2008 - 20:34
Published 09-06-2003 - 04:00
Last modified 05-09-2008 - 20:34
Back to Top