ID CVE-2003-0362
Summary Buffer overflow in gPS before 0.10.2 may allow local users to cause a denial of service (SIGSEGV) in rgpsp via long command lines.
References
Vulnerable Configurations
  • cpe:2.3:o:debian:debian_linux:0.9.1:*:woody_gps_package:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.1:*:woody_gps_package:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:0.9.2:*:woody_gps_package:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.2:*:woody_gps_package:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:0.9.3:*:woody_gps_package:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.3:*:woody_gps_package:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:0.9.4:*:woody_gps_package:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.4:*:woody_gps_package:*:*:*:*:*
CVSS
Base: 5.0 (as of 05-09-2008 - 20:34)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
confirm http://gps.seul.org/changelog.html
debian DSA-307
Last major update 05-09-2008 - 20:34
Published 09-06-2003 - 04:00
Last modified 05-09-2008 - 20:34
Back to Top