ID CVE-2004-1388
Summary Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
References
Vulnerable Configurations
  • cpe:2.3:a:berlios:gps_daemon:1.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:1.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:1.25:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:1.25:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:1.26:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:1.26:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:1.91:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:1.91:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:1.92:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:1.92:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:1.93:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:1.93:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:1.94:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:1.94:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:1.95:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:1.95:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:1.96:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:1.96:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:1.97:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:1.97:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:1.98:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:1.98:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:2.4:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:berlios:gps_daemon:2.7:*:*:*:*:*:*:*
    cpe:2.3:a:berlios:gps_daemon:2.7:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bugtraq 20050126 DMA[2005-0125a] - 'berlios gpsd format string vulnerability'
confirm http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html
misc http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt
mlist [Gpsd-announce] 20050127 Announcing release 2.8 of gpsd
xf gpsd-format-string(19079)
Last major update 11-07-2017 - 01:30
Published 31-12-2004 - 05:00
Last modified 11-07-2017 - 01:30
Back to Top