Multiple buffer overflows in gPS before 1.0.0 allow attackers to cause a denial of service and possibly execute arbitrary code.
References
| Link | Resource |
|---|---|
| http://gps.seul.org/changelog.html | Patch |
| http://www.debian.org/security/2003/dsa-307 | Patch Vendor Advisory |
| http://gps.seul.org/changelog.html | Patch |
| http://www.debian.org/security/2003/dsa-307 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:44
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://gps.seul.org/changelog.html - Patch | |
| References | () http://www.debian.org/security/2003/dsa-307 - Patch, Vendor Advisory |
Information
Published : 2003-06-09 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2003-0360
Mitre link : CVE-2003-0360
CVE.ORG link : CVE-2003-0360
JSON object : View
Products Affected
debian
- debian_linux
CWE
