The NMEA0183 driver in gpsd before 3.9 allows remote attackers to cause a denial of service (daemon termination) and possibly execute arbitrary code via a GPS packet with a malformed $GPGGA interpreted sentence that lacks certain fields and a terminator. NOTE: a separate issue in the AIS driver was also reported, but it might not be a vulnerability.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://git.savannah.gnu.org/cgit/gpsd.git/commit/?id=dd9c3c2830cb8f8fd8491ce68c82698dc5538f50 | patch exploit |
http://www.osvdb.org/93000 | vdb entry |
http://ubuntu.com/usn/usn-1820-1 | vendor advisory |
http://openwall.com/lists/oss-security/2013/05/08/1 | mailing list |
http://openwall.com/lists/oss-security/2013/05/02/20 | mailing list |
http://lists.nongnu.org/archive/html/gpsd-dev/2013-05/msg00000.html | mailing list |
http://www.osvdb.org/93001 | vdb entry |