Executive Summary
Summary | |
---|---|
Title | New gopher packages fix buffer overflows |
Informations | |||
---|---|---|---|
Name | DSA-387 | First vendor Publication | 2003-09-18 |
Vendor | Debian | Last vendor Modification | 2003-09-18 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
gopherd, a gopher server from the University of Minnesota, contains a number of buffer overflows which could be exploited by a remote attacker to execute arbitrary code with the privileges of the gopherd process (the "gopher" user by default). For the stable distribution (woody) this problem has been fixed in version 3.0.3woody1. This program has been removed from the unstable distribution (sid). gopherd is deprecated, and users are recommended to use PyGopherd instead. We recommend that you update your gopherd package. |
Original Source
Url : http://www.debian.org/security/2003/dsa-387 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 387-1 (gopher) File : nvt/deb_387_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
10194 | UMN Gopher Daemon (gopherd) GSisText Function Overflow |
10193 | UMN Gopher Daemon (gopherd) LIST Command Filename Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-387.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:54 |
|