Vulnerability Details : CVE-2003-0361
gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp.
Products affected by CVE-2003-0361
- cpe:2.3:o:debian:debian_linux:0.9.2:*:woody_gps_package:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:0.9.3:*:woody_gps_package:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:0.9.4:*:woody_gps_package:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:0.9.1:*:woody_gps_package:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-0361
0.64%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0361
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-0361
-
http://gps.seul.org/changelog.html
Patch
-
http://www.debian.org/security/2003/dsa-307
Patch;Vendor Advisory
Jump to