Vulnerabilities > CVE-2004-1388 - Unspecified vulnerability in Berlios GPS Daemon
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
Vulnerable Configurations
Exploit-Db
description Berlios GPSD Format String Vulnerability. CVE-2004-1388. Remote exploit for linux platform id EDB-ID:16853 last seen 2016-02-02 modified 2010-04-30 published 2010-04-30 reporter metasploit source https://www.exploit-db.com/download/16853/ title Berlios GPSD Format String Vulnerability description Berlios GPSD 1.91-1 - 2.7-2 Format String Vulnerability. CVE-2004-1388. Remote exploit for linux platform id EDB-ID:10029 last seen 2016-02-01 modified 2005-05-25 published 2005-05-25 reporter Yann Senotier source https://www.exploit-db.com/download/10029/ title Berlios GPSD 1.91-1 - 2.7-2 - Format String Vulnerability description Berlios GPSD <= 2.7 Remote Format String Exploit (meta). CVE-2004-1388. Remote exploit for linux platform id EDB-ID:3099 last seen 2016-01-31 modified 2007-01-08 published 2007-01-08 reporter Enseirb source https://www.exploit-db.com/download/3099/ title Berlios GPSD <= 2.7 - Remote Format String Exploit meta description Berlios gpsd <= 2.7.x Remote Format String Vulnerability. CVE-2004-1388. Remote exploit for linux platform id EDB-ID:775 last seen 2016-01-31 modified 2005-01-26 published 2005-01-26 reporter JohnH source https://www.exploit-db.com/download/775/ title Berlios gpsd <= 2.7.x - Remote Format String Vulnerability
Metasploit
description | This module exploits a format string vulnerability in the Berlios GPSD server. This vulnerability was discovered by Kevin Finisterre. |
id | MSF:EXPLOIT/LINUX/HTTP/GPSD_FORMAT_STRING |
last seen | 2020-06-01 |
modified | 2017-07-24 |
published | 2007-12-18 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/http/gpsd_format_string.rb |
title | Berlios GPSD Format String Vulnerability |
Nessus
NASL family | Gain a shell remotely |
NASL id | GPSD_OVERFLOW.NASL |
description | The remote host is running GPSD, a daemon which monitors a GPS device and publishes its data over the network. The remote version of this software is vulnerable to format string attack due to the way it uses the syslog() call. An attacker may exploit this flaw to execute arbitrary code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 16265 |
published | 2005-01-27 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/16265 |
title | Berlios gpsd gpsd_report() Function Format String |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/82236/gpsd_format_string.rb.txt |
id | PACKETSTORM:82236 |
last seen | 2016-12-05 |
published | 2009-10-27 |
reporter | Yann Senotier |
source | https://packetstormsecurity.com/files/82236/Berlios-GPSD-Format-String-Vulnerability.html |
title | Berlios GPSD Format String Vulnerability |
References
- http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html
- http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html
- http://marc.info/?l=bugtraq&m=110677341711505&w=2
- http://marc.info/?l=bugtraq&m=110677341711505&w=2
- http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt
- http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt
- http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html
- http://www.mail-archive.com/debian-bugs-closed%40lists.debian.org/msg02103.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19079
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19079