7.5
CVSSv2

CVE-2003-0361

Published: 09/06/2003 Updated: 05/09/2008
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

gPS prior to 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote malicious users to connect to rgpsp.

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 0.9.2

debian debian linux 0.9.4

debian debian linux 0.9.1

debian debian linux 0.9.3

Vendor Advisories

gPS is a graphical application to watch system processes In release 110 of the gps package, several security vulnerabilities were fixed, as detailed in the changelog: bug fix on rgpsp connection source acceptation policy (it was allowing any host to connect even when the /etc/rgpspconf file told otherwise) It is working now, but on ...