Lucene search

K
cve[email protected]CVE-2004-1388
HistoryFeb 06, 2005 - 5:00 a.m.

CVE-2004-1388

2005-02-0605:00:00
web.nvd.nist.gov
26
cve-2004-1388
format string vulnerability
berlios gpd daemon
remote code execution
gps requests
syslog calls.

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.661 Medium

EPSS

Percentile

97.9%

Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.

Affected configurations

NVD
Node
berliosgps_daemonMatch1.9.0
OR
berliosgps_daemonMatch1.25
OR
berliosgps_daemonMatch1.26
OR
berliosgps_daemonMatch1.91
OR
berliosgps_daemonMatch1.92
OR
berliosgps_daemonMatch1.93
OR
berliosgps_daemonMatch1.94
OR
berliosgps_daemonMatch1.95
OR
berliosgps_daemonMatch1.96
OR
berliosgps_daemonMatch1.97
OR
berliosgps_daemonMatch1.98
OR
berliosgps_daemonMatch2.0
OR
berliosgps_daemonMatch2.1
OR
berliosgps_daemonMatch2.2
OR
berliosgps_daemonMatch2.3
OR
berliosgps_daemonMatch2.4
OR
berliosgps_daemonMatch2.7

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.661 Medium

EPSS

Percentile

97.9%