Description
An issue was discovered in kosma minmea 0.3.0. The minmea_scan functions format specifier copies NMEA field data to a caller-provided buffer without a size parameter. Applications using minmea_scan on untrusted input are vulnerable to a stack buffer overflow.
Published: 2026-05-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a stack buffer overflow caused by kosma minmea 0.3.0’s minmea_scan functions copying NMEA field data to caller-provided buffers without a size parameter. The overflow allows an attacker to overwrite stack memory and corrupt control‑flow data or inject executable bytes. Based on the description, it is inferred that an attacker who can supply crafted NMEA payloads may achieve arbitrary code execution, a classic CWE‑121 stack‑based buffer overflow. This flaw directly threatens confidentiality, integrity, and availability of applications that process untrusted NMEA input.

Affected Systems

Affected systems include any software that links against kosma minmea 0.3.0 and accepts NMEA messages from external or untrusted sources. Because no specific vendor or product line is enumerated, any application using this library version for parsing GPS or navigation data is potentially at risk.

Risk and Exploitability

The CVSS score is 7.5 and EPSS is not available, but the nature of the overflow suggests a high severity potential. The flaw is not currently listed in CISA KEV. Because the buffer copy is unchecked, an attacker can supply malformed NMEA data over any interface that forwards such messages, such as satellite receivers, GPS modules, or networked parsing services. The lack of bounds checking makes exploitation feasible for a skilled attacker and therefore represents a high‑risk vulnerability with a likely remote attack vector.

Generated by OpenCVE AI on May 8, 2026 at 22:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace or update kosma minmea to a version that implements bounds checking or swap to an alternative, properly audited NMEA parsing library.
  • Add explicit size limits around any calls to minmea_scan, ensuring that caller buffers are at least as large as the data being copied, or refactor the parsing logic to use safe string handling functions.
  • Avoid feeding untrusted NMEA data directly to minmea_scan; implement input validation or sanitization steps before parsing to mitigate the overflow risk.

Generated by OpenCVE AI on May 8, 2026 at 22:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 23:15:00 +0000

Type Values Removed Values Added
Title Untrusted Input Causes Stack Buffer Overflow in kosma minmea 0.3.0

Fri, 08 May 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Fri, 08 May 2026 20:00:00 +0000

Type Values Removed Values Added
Title Untrusted Input Causes Stack Buffer Overflow in kosma minmea 0.3.0
Weaknesses CWE-119

Fri, 08 May 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 May 2026 16:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered in kosma minmea 0.3.0. The minmea_scan functions format specifier copies NMEA field data to a caller-provided buffer without a size parameter. Applications using minmea_scan on untrusted input are vulnerable to a stack buffer overflow.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-08T18:11:56.696Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29974

cve-icon Vulnrichment

Updated: 2026-05-08T18:09:38.256Z

cve-icon NVD

Status : Received

Published: 2026-05-08T16:16:10.090

Modified: 2026-05-08T19:16:30.257

Link: CVE-2026-29974

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T23:00:16Z

Weaknesses