First published: Fri May 30 2003(Updated: )
Multiple buffer overflows in gPS before 1.0.0 allow attackers to cause a denial of service and possibly execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Linux | =0.9.2 | |
Debian Linux | =0.9.3 | |
Debian Linux | =0.9.1 | |
Debian Linux | =0.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0360 has a high severity level due to multiple buffer overflows that can lead to denial of service and potential arbitrary code execution.
CVE-2003-0360 affects gPS versions prior to 1.0.0, particularly versions 0.9.1 through 0.9.4 for the Debian GNU/Linux distribution.
To fix CVE-2003-0360, you should upgrade gPS to version 1.0.0 or later.
Yes, CVE-2003-0360 can potentially allow attackers to execute arbitrary code remotely due to the vulnerabilities present in the software.
The impact of CVE-2003-0360 includes possible system crashes and unauthorized access to execute code, leading to security breaches.