Search criteria
3 vulnerabilities found for gps_daemon by berlios
CVE-2004-1388 (GCVE-0-2004-1388)
Vulnerability from cvelistv5 – Published: 2005-02-06 05:00 – Updated: 2024-08-08 00:46
VLAI?
Summary
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T00:46:12.549Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
},
{
"name": "gpsd-format-string(19079)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
},
{
"name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-01-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
},
{
"name": "gpsd-format-string(19079)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
},
{
"name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-1388",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
"refsource": "MLIST",
"url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
},
{
"name": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt",
"refsource": "MISC",
"url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
},
{
"name": "gpsd-format-string(19079)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
},
{
"name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
},
{
"name": "http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html",
"refsource": "CONFIRM",
"url": "http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-1388",
"datePublished": "2005-02-06T05:00:00",
"dateReserved": "2005-01-31T00:00:00",
"dateUpdated": "2024-08-08T00:46:12.549Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-1388 (GCVE-0-2004-1388)
Vulnerability from nvd – Published: 2005-02-06 05:00 – Updated: 2024-08-08 00:46
VLAI?
Summary
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T00:46:12.549Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
},
{
"name": "gpsd-format-string(19079)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
},
{
"name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-01-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
},
{
"name": "gpsd-format-string(19079)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
},
{
"name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-1388",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
"refsource": "MLIST",
"url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
},
{
"name": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt",
"refsource": "MISC",
"url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
},
{
"name": "gpsd-format-string(19079)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
},
{
"name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
},
{
"name": "http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html",
"refsource": "CONFIRM",
"url": "http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-1388",
"datePublished": "2005-02-06T05:00:00",
"dateReserved": "2005-01-31T00:00:00",
"dateUpdated": "2024-08-08T00:46:12.549Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2004-1388
Vulnerability from fkie_nvd - Published: 2004-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| berlios | gps_daemon | 1.9.0 | |
| berlios | gps_daemon | 1.25 | |
| berlios | gps_daemon | 1.26 | |
| berlios | gps_daemon | 1.91 | |
| berlios | gps_daemon | 1.92 | |
| berlios | gps_daemon | 1.93 | |
| berlios | gps_daemon | 1.94 | |
| berlios | gps_daemon | 1.95 | |
| berlios | gps_daemon | 1.96 | |
| berlios | gps_daemon | 1.97 | |
| berlios | gps_daemon | 1.98 | |
| berlios | gps_daemon | 2.0 | |
| berlios | gps_daemon | 2.1 | |
| berlios | gps_daemon | 2.2 | |
| berlios | gps_daemon | 2.3 | |
| berlios | gps_daemon | 2.4 | |
| berlios | gps_daemon | 2.7 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BF5B43-E991-499C-8486-3C3D10FF3838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "98CB56A2-F595-4E6A-857E-3752BB11FCFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5473A-D42A-4898-82D7-D6876702CA6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "D1BE9813-7D38-4846-A6F7-DCB46BADFCCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "FCEC3092-B77C-46EA-B885-82BDCA5FD73A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "217F2CD2-F88E-4BDA-B112-EC71E6AFE222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:1.94:*:*:*:*:*:*:*",
"matchCriteriaId": "1BE9DA6B-F330-4FB4-8E92-50B24444B049",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "2E49EFDE-9FE7-4C0F-B0B2-947F3748E549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:1.96:*:*:*:*:*:*:*",
"matchCriteriaId": "76771AAF-8D1B-4E38-98EB-D61055F22157",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:1.97:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD194D6-B291-4572-83EF-4D6C411428C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:1.98:*:*:*:*:*:*:*",
"matchCriteriaId": "14AC539E-FD65-4E93-B2D5-9ABAE8B9D94C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "119AC07F-DE36-4BB5-A359-A11846147BEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C971C2DE-924A-4488-BB14-5516013E19E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "443BF6C5-95DA-4F5B-B664-7CED2F28C389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C3ABA05A-BEC5-49EF-9A37-309FEE10B56A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "950A0BC0-6B60-48EA-887E-B6FFA6F58099",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:berlios:gps_daemon:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF452D8-F3B8-4F81-98EF-344562B962B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
}
],
"id": "CVE-2004-1388",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
},
{
"source": "cve@mitre.org",
"url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}