Vulnerability Details : CVE-2003-0361
gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp.
Exploit prediction scoring system (EPSS) score for CVE-2003-0361
Probability of exploitation activity in the next 30 days: 0.31%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 67 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-0361
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-0361
- http://gps.seul.org/changelog.html
-
http://www.debian.org/security/2003/dsa-307
Patch;Vendor Advisory
Products affected by CVE-2003-0361
- cpe:2.3:o:debian:debian_linux:0.9.2:*:woody_gps_package:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:0.9.3:*:woody_gps_package:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:0.9.4:*:woody_gps_package:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:0.9.1:*:woody_gps_package:*:*:*:*:*