- Description
- gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:0.9.1:*:woody_gps_package:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DA406AE4-7F84-4DC7-8454-249B7F16BE00"
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:0.9.2:*:woody_gps_package:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CE4E5A13-9D8D-47DA-BE8A-18F4C8F88F2C"
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:0.9.3:*:woody_gps_package:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6A99BBA6-DFB9-4450-9C43-E612991C73EF"
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:0.9.4:*:woody_gps_package:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "68B9AEF1-8D70-422E-8F9D-739BB3CBE1F3"
}
],
"operator": "OR"
}
]
}
]