Vulnerabilites related to berlios - gps_daemon
CVE-2004-1388 (GCVE-0-2004-1388)
Vulnerability from cvelistv5
Published
2005-02-06 05:00
Modified
2024-08-08 00:46
Severity ?
CWE
  • n/a
Summary
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:46:12.549Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
          },
          {
            "name": "gpsd-format-string(19079)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
          },
          {
            "name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-01-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
        },
        {
          "name": "gpsd-format-string(19079)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
        },
        {
          "name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1388",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
              "refsource": "MLIST",
              "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
            },
            {
              "name": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt",
              "refsource": "MISC",
              "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
            },
            {
              "name": "gpsd-format-string(19079)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
            },
            {
              "name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
            },
            {
              "name": "http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html",
              "refsource": "CONFIRM",
              "url": "http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1388",
    "datePublished": "2005-02-06T05:00:00",
    "dateReserved": "2005-01-31T00:00:00",
    "dateUpdated": "2024-08-08T00:46:12.549Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BF5B43-E991-499C-8486-3C3D10FF3838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CB56A2-F595-4E6A-857E-3752BB11FCFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD5473A-D42A-4898-82D7-D6876702CA6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1BE9813-7D38-4846-A6F7-DCB46BADFCCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCEC3092-B77C-46EA-B885-82BDCA5FD73A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "217F2CD2-F88E-4BDA-B112-EC71E6AFE222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BE9DA6B-F330-4FB4-8E92-50B24444B049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E49EFDE-9FE7-4C0F-B0B2-947F3748E549",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "76771AAF-8D1B-4E38-98EB-D61055F22157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FD194D6-B291-4572-83EF-4D6C411428C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "14AC539E-FD65-4E93-B2D5-9ABAE8B9D94C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "119AC07F-DE36-4BB5-A359-A11846147BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C971C2DE-924A-4488-BB14-5516013E19E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "443BF6C5-95DA-4F5B-B664-7CED2F28C389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3ABA05A-BEC5-49EF-9A37-309FEE10B56A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "950A0BC0-6B60-48EA-887E-B6FFA6F58099",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CF452D8-F3B8-4F81-98EF-344562B962B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
    }
  ],
  "id": "CVE-2004-1388",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}