Search criteria

3 vulnerabilities found for gps_daemon by berlios

CVE-2004-1388 (GCVE-0-2004-1388)

Vulnerability from cvelistv5 – Published: 2005-02-06 05:00 – Updated: 2024-08-08 00:46
VLAI?
Summary
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:46:12.549Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
          },
          {
            "name": "gpsd-format-string(19079)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
          },
          {
            "name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-01-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
        },
        {
          "name": "gpsd-format-string(19079)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
        },
        {
          "name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1388",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
              "refsource": "MLIST",
              "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
            },
            {
              "name": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt",
              "refsource": "MISC",
              "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
            },
            {
              "name": "gpsd-format-string(19079)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
            },
            {
              "name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
            },
            {
              "name": "http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html",
              "refsource": "CONFIRM",
              "url": "http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1388",
    "datePublished": "2005-02-06T05:00:00",
    "dateReserved": "2005-01-31T00:00:00",
    "dateUpdated": "2024-08-08T00:46:12.549Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-1388 (GCVE-0-2004-1388)

Vulnerability from nvd – Published: 2005-02-06 05:00 – Updated: 2024-08-08 00:46
VLAI?
Summary
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:46:12.549Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
          },
          {
            "name": "gpsd-format-string(19079)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
          },
          {
            "name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-01-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
        },
        {
          "name": "gpsd-format-string(19079)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
        },
        {
          "name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1388",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd",
              "refsource": "MLIST",
              "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
            },
            {
              "name": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt",
              "refsource": "MISC",
              "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
            },
            {
              "name": "gpsd-format-string(19079)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
            },
            {
              "name": "20050126 DMA[2005-0125a] - \u0027berlios gpsd format string vulnerability\u0027",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
            },
            {
              "name": "http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html",
              "refsource": "CONFIRM",
              "url": "http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1388",
    "datePublished": "2005-02-06T05:00:00",
    "dateReserved": "2005-01-31T00:00:00",
    "dateUpdated": "2024-08-08T00:46:12.549Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

FKIE_CVE-2004-1388

Vulnerability from fkie_nvd - Published: 2004-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BF5B43-E991-499C-8486-3C3D10FF3838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CB56A2-F595-4E6A-857E-3752BB11FCFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD5473A-D42A-4898-82D7-D6876702CA6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1BE9813-7D38-4846-A6F7-DCB46BADFCCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCEC3092-B77C-46EA-B885-82BDCA5FD73A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "217F2CD2-F88E-4BDA-B112-EC71E6AFE222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BE9DA6B-F330-4FB4-8E92-50B24444B049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E49EFDE-9FE7-4C0F-B0B2-947F3748E549",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "76771AAF-8D1B-4E38-98EB-D61055F22157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FD194D6-B291-4572-83EF-4D6C411428C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:1.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "14AC539E-FD65-4E93-B2D5-9ABAE8B9D94C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "119AC07F-DE36-4BB5-A359-A11846147BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C971C2DE-924A-4488-BB14-5516013E19E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "443BF6C5-95DA-4F5B-B664-7CED2F28C389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3ABA05A-BEC5-49EF-9A37-309FEE10B56A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "950A0BC0-6B60-48EA-887E-B6FFA6F58099",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:berlios:gps_daemon:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CF452D8-F3B8-4F81-98EF-344562B962B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls."
    }
  ],
  "id": "CVE-2004-1388",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=110677341711505\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19079"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}