CVE Vulnerabilities

CVE-2004-1388

Published: Dec 31, 2004 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.

Affected Software

NameVendorStart VersionEnd Version
Gps_daemonBerlios1.9.0 (including)1.9.0 (including)
Gps_daemonBerlios1.25 (including)1.25 (including)
Gps_daemonBerlios1.26 (including)1.26 (including)
Gps_daemonBerlios1.91 (including)1.91 (including)
Gps_daemonBerlios1.92 (including)1.92 (including)
Gps_daemonBerlios1.93 (including)1.93 (including)
Gps_daemonBerlios1.94 (including)1.94 (including)
Gps_daemonBerlios1.95 (including)1.95 (including)
Gps_daemonBerlios1.96 (including)1.96 (including)
Gps_daemonBerlios1.97 (including)1.97 (including)
Gps_daemonBerlios1.98 (including)1.98 (including)
Gps_daemonBerlios2.0 (including)2.0 (including)
Gps_daemonBerlios2.1 (including)2.1 (including)
Gps_daemonBerlios2.2 (including)2.2 (including)
Gps_daemonBerlios2.3 (including)2.3 (including)
Gps_daemonBerlios2.4 (including)2.4 (including)
Gps_daemonBerlios2.7 (including)2.7 (including)
GpsdUbuntudapper*
GpsdUbuntudevel*
GpsdUbuntuedgy*
GpsdUbuntufeisty*

References