Описание
gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.
gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2018-17937
- https://ics-cert.us-cert.gov/advisories/ICSA-18-310-01
- https://lists.debian.org/debian-lts-announce/2019/03/msg00040.html
- https://lists.debian.org/debian-lts-announce/2021/10/msg00024.html
- https://security.gentoo.org/glsa/202009-17
- http://www.securityfocus.com/bid/107029
Связанные уязвимости
gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.
gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.
gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open ...
Уязвимость демона отслеживания приемников GPS GPSd, связанная с переполнением буфера на стеке, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании