Korean
<< Back
VID 23119
Severity 40
Port 2947
Protocol TCP
Class Daemon
Detailed Description The gpsd service, according to its version number, has a format string vulnerability. BerliOS gpsd is a service daemon listening on TCP port 2947 that monitors a GPS attached to the host computer through a serial or USB port. gpsd versions prior to 2.8 are vulnerable to a format string attack, caused by a vulnerability in the gpsd_report() function. By sending certain GPS requests containing format string specifiers that are not properly handled in syslog calls, a remote attacker could execute arbitrary code on the affected system.

* Note: This check solely relied on the version number of the remote service to assess this vulnerability, so this might be a false positive.

* References:
http://www.digitalmunition.com/DMA[2005-0125a].txt
http://www.securiteam.com/unixfocus/5LP0M1PEKK.html

* Platforms Affected:
BerliOS gpsd versions prior to 2.8
Any operating system Any version
Recommendation Upgrade to the latest version of gpsd (2.8 or later), available from the gpsd Web site at http://gpsd.berlios.de/
Related URL CVE-2004-1388 (CVE)
Related URL 12371 (SecurityFocus)
Related URL 19079 (ISS)