Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2004-1388

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2004-1388
Last Modified 05 Sep 2008 04:41:13
Published 31 Dec 2004 12:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2004-1388

Summary

Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.

Vulnerable Systems

Application

  • Berlios Gps Daemon 1.25

  • Berlios Gps Daemon 1.26

  • Berlios Gps Daemon 1.9.0

  • Berlios Gps Daemon 1.91

  • Berlios Gps Daemon 1.92

  • Berlios Gps Daemon 1.93

  • Berlios Gps Daemon 1.94

  • Berlios Gps Daemon 1.95

  • Berlios Gps Daemon 1.96

  • Berlios Gps Daemon 1.97

  • Berlios Gps Daemon 1.98

  • Berlios Gps Daemon 2.0

  • Berlios Gps Daemon 2.1

  • Berlios Gps Daemon 2.2

  • Berlios Gps Daemon 2.3

  • Berlios Gps Daemon 2.4

  • Berlios Gps Daemon 2.7


References

MLIST - [Gpsd-announce] 20050127 Announcing release 2.8 of gpsd

XF - gpsd-format-string(19079)

CONFIRM - http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html

MISC - http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt

BUGTRAQ - 20050126 DMA[2005-0125a] - 'berlios gpsd format string vulnerability'


Last Updated: 27 May 2016 10:39:01