Executive Summary
Summary | |
---|---|
Title | New libgtop packages fix buffer overflow |
Informations | |||
---|---|---|---|
Name | DSA-301 | First vendor Publication | 2003-05-07 |
Vendor | Debian | Last vendor Modification | 2003-05-07 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The gtop daemon, used for monitoring remote machines, contains a buffer overflow which could be used by an attacker to execute arbitrary code with the privileges of the daemon process. If started as root, the daemon process drops root privileges, assuming uid and gid 99 by default. This bug was previously fixed in DSA-098, but one of the patches was not carried over to later versions of libgtop. For the stable distribution (woody), this problem has been fixed in version 1.0.13-3.1. For the old stable distribution (potato), this problem was fixed in DSA-098. For the unstable distribution (sid), this problem has been fixed in version 1.0.13-4. We recommend that you update your libgtop package. |
Original Source
Url : http://www.debian.org/security/2003/dsa-301 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 5 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 098-1 (libgtop) File : nvt/deb_098_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 301-1 (libgtop) File : nvt/deb_301_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
13994 | GNOME libgtop permitted Function Authentication Data Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-098.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-301.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2001-094.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:37 |
|
2013-05-11 12:18:11 |
|