VYPR
Unrated severityNVD Advisory· Published Dec 31, 2004· Updated Apr 16, 2026

CVE-2004-1388

CVE-2004-1388

Description

Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.

Affected products

17
  • Berlios/Gps Daemon17 versions
    cpe:2.3:a:berlios:gps_daemon:1.9.0:*:*:*:*:*:*:*+ 16 more
    • cpe:2.3:a:berlios:gps_daemon:1.9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:1.25:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:1.26:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:1.91:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:1.92:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:1.93:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:1.94:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:1.95:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:1.96:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:1.97:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:1.98:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:berlios:gps_daemon:2.7:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.