Vulnerabilities > CVE-2003-0361 - Unspecified vulnerability in Debian Linux

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
debian
nessus

Summary

gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp.

Nessus

NASL familyDebian Local Security Checks
NASL idDEBIAN_DSA-307.NASL
descriptiongPS is a graphical application to watch system processes. In release 1.1.0 of the gps package, several security vulnerabilities were fixed, as detailed in the changelog : - bug fix on rgpsp connection source acceptation policy (it was allowing any host to connect even when the /etc/rgpsp.conf file told otherwise). It is working now, but on any real (
last seen2020-06-01
modified2020-06-02
plugin id15144
published2004-09-29
reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15144
titleDebian DSA-307-1 : gps - multiple vulnerabilities