3 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

05 Dec 2023 — An integer underflow vulnerability exists in the NTRIP Stream Parsing functionality of GPSd 3.25.1~dev. A specially crafted network packet can lead to memory corruption. An attacker can send a malicious packet to trigger this vulnerability. Existe una vulnerabilidad de desbordamiento de enteros en la funcionalidad NTRIP Stream Parsing de GPSd 3.25.1~dev. Un paquete de red especialmente manipulado puede provocar daños en la memoria. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1860 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 8.8EPSS: 4%CPEs: 4EXPL: 0

13 Mar 2019 — gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs. gpsd, desde la CVErsión 2.90 hasta la 3.17 y microjson, desde la CVErsión 1.0 hasta la 1.3, proyectos de código abierto, permiten un desbordamiento de búfer basado en pila, lo que podría permitir que los atacantes remotos ejecuten código arbitrario en pla... • http://www.securityfocus.com/bid/107029 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 2%CPEs: 10EXPL: 1

06 Feb 2014 — The NMEA0183 driver in gpsd before 3.9 allows remote attackers to cause a denial of service (daemon termination) and possibly execute arbitrary code via a GPS packet with a malformed $GPGGA interpreted sentence that lacks certain fields and a terminator. NOTE: a separate issue in the AIS driver was also reported, but it might not be a vulnerability. El driver NMEA0183 en gpsd anterior a 3.9 permite a atacantes remotos causar una denegación de servicio (finalización del demonio) y posiblemente ejecutar códig... • http://git.savannah.gnu.org/cgit/gpsd.git/commit/?id=dd9c3c2830cb8f8fd8491ce68c82698dc5538f50 • CWE-20: Improper Input Validation •