| VID |
23119 |
| Severity |
40 |
| Port |
2947 |
| Protocol |
TCP |
| Class |
Daemon |
| Detailed Description |
The gpsd service, according to its version number, has a format string vulnerability. BerliOS gpsd is a service daemon listening on TCP port 2947 that monitors a GPS attached to the host computer through a serial or USB port. gpsd versions prior to 2.8 are vulnerable to a format string attack, caused by a vulnerability in the gpsd_report() function. By sending certain GPS requests containing format string specifiers that are not properly handled in syslog calls, a remote attacker could execute arbitrary code on the affected system.
* Note: This check solely relied on the version number of the remote service to assess this vulnerability, so this might be a false positive.
* References: http://www.digitalmunition.com/DMA[2005-0125a].txt http://www.securiteam.com/unixfocus/5LP0M1PEKK.html
* Platforms Affected: BerliOS gpsd versions prior to 2.8 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of gpsd (2.8 or later), available from the gpsd Web site at http://gpsd.berlios.de/ |
| Related URL |
CVE-2004-1388 (CVE) |
| Related URL |
12371 (SecurityFocus) |
| Related URL |
19079 (ISS) |
|