CVE-2023-43628
 
Severity Score
7.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
An integer underflow vulnerability exists in the NTRIP Stream Parsing functionality of GPSd 3.25.1~dev. A specially crafted network packet can lead to memory corruption. An attacker can send a malicious packet to trigger this vulnerability.
Existe una vulnerabilidad de desbordamiento de enteros en la funcionalidad NTRIP Stream Parsing de GPSd 3.25.1~dev. Un paquete de red especialmente manipulado puede provocar daƱos en la memoria. Un atacante puede enviar un paquete malicioso para desencadenar esta vulnerabilidad.
*Credits:
Discovered by Dimitrios Tatsis of Cisco Talos.
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-11-15 CVE Reserved
- 2023-12-05 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- 2024-11-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-191: Integer Underflow (Wrap or Wraparound)
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1860 | 2024-08-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gpsd Project Search vendor "Gpsd Project" | Gpsd Search vendor "Gpsd Project" for product "Gpsd" | 3.25.1 Search vendor "Gpsd Project" for product "Gpsd" and version "3.25.1" | dev |
Affected
|