Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2004-1388


Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.


Published

2004-12-31T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application berlios gps_daemon 1.9.0 Yes
Application berlios gps_daemon 1.25 Yes
Application berlios gps_daemon 1.26 Yes
Application berlios gps_daemon 1.91 Yes
Application berlios gps_daemon 1.92 Yes
Application berlios gps_daemon 1.93 Yes
Application berlios gps_daemon 1.94 Yes
Application berlios gps_daemon 1.95 Yes
Application berlios gps_daemon 1.96 Yes
Application berlios gps_daemon 1.97 Yes
Application berlios gps_daemon 1.98 Yes
Application berlios gps_daemon 2.0 Yes
Application berlios gps_daemon 2.1 Yes
Application berlios gps_daemon 2.2 Yes
Application berlios gps_daemon 2.3 Yes
Application berlios gps_daemon 2.4 Yes
Application berlios gps_daemon 2.7 Yes

References