Description
gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.
Published: 2019-03-13
Score: 8.8 High
EPSS: 3.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1738-1 gpsd security update
Debian DLA Debian DLA DLA-2795-1 gpsd security update
EUVD EUVD EUVD-2018-9678 gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.
History

No history.

Subscriptions

Debian Debian Linux
Gpsd Project Gpsd
Microjson Project Microjson
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-16T19:36:34.191Z

Reserved: 2018-10-02T00:00:00.000Z

Link: CVE-2018-17937

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-13T17:29:00.227

Modified: 2024-11-21T03:55:14.740

Link: CVE-2018-17937

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses