First published: Fri Dec 31 2004(Updated: )
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Berlios Gps Daemon | =1.9.0 | |
Berlios Gps Daemon | =1.25 | |
Berlios Gps Daemon | =1.26 | |
Berlios Gps Daemon | =1.91 | |
Berlios Gps Daemon | =1.92 | |
Berlios Gps Daemon | =1.93 | |
Berlios Gps Daemon | =1.94 | |
Berlios Gps Daemon | =1.95 | |
Berlios Gps Daemon | =1.96 | |
Berlios Gps Daemon | =1.97 | |
Berlios Gps Daemon | =1.98 | |
Berlios Gps Daemon | =2.0 | |
Berlios Gps Daemon | =2.1 | |
Berlios Gps Daemon | =2.2 | |
Berlios Gps Daemon | =2.3 | |
Berlios Gps Daemon | =2.4 | |
Berlios Gps Daemon | =2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.