{ "id": "CVE-2013-2038", "sourceIdentifier": "secalert@redhat.com", "published": "2014-02-06T17:00:04.400", "lastModified": "2024-11-21T01:50:54.753", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NMEA0183 driver in gpsd before 3.9 allows remote attackers to cause a denial of service (daemon termination) and possibly execute arbitrary code via a GPS packet with a malformed $GPGGA interpreted sentence that lacks certain fields and a terminator. NOTE: a separate issue in the AIS driver was also reported, but it might not be a vulnerability." }, { "lang": "es", "value": "El driver NMEA0183 en gpsd anterior a 3.9 permite a atacantes remotos causar una denegaci\u00f3n de servicio (finalizaci\u00f3n del demonio) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete GPS con una secuencia interpretada $GPGGA malformada que carece de ciertos campos y de terminador. NOTA: un problema a parte en el driver AIS se ha reportado tambi\u00e9n, pero podr\u00eda no ser una vulnerabilidad." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:gpsd_project:gpsd:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.8", "matchCriteriaId": "1F5DD4A1-8EF3-488D-A04D-615D6DF53E54" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gpsd_project:gpsd:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "66F36D69-5134-4168-96EA-6698647F21D3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gpsd_project:gpsd:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "14F30C7C-E01D-4D61-9432-9031C057B64D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gpsd_project:gpsd:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "16B94CE5-9222-4071-972C-84058398BE57" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gpsd_project:gpsd:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B92FDFB0-E9EA-48D7-AEE9-040722B82B1F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gpsd_project:gpsd:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "AF0E6F4C-FAE2-4F44-A22E-138C32CD8A0A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gpsd_project:gpsd:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "50D3393F-1938-455E-ABC6-83A31B83A975" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gpsd_project:gpsd:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "8E0FC04C-6F21-40FE-AA76-AE2C58DE4161" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gpsd_project:gpsd:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "A8825DE5-C031-4946-AA25-5AF410E640D0" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69" } ] } ] } ], "references": [ { "url": "http://git.savannah.gnu.org/cgit/gpsd.git/commit/?id=dd9c3c2830cb8f8fd8491ce68c82698dc5538f50", "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ] }, { "url": "http://lists.nongnu.org/archive/html/gpsd-dev/2013-05/msg00000.html", "source": "secalert@redhat.com" }, { "url": "http://openwall.com/lists/oss-security/2013/05/02/20", "source": "secalert@redhat.com" }, { "url": "http://openwall.com/lists/oss-security/2013/05/08/1", "source": "secalert@redhat.com" }, { "url": "http://ubuntu.com/usn/usn-1820-1", "source": "secalert@redhat.com" }, { "url": "http://www.osvdb.org/93000", "source": "secalert@redhat.com" }, { "url": "http://www.osvdb.org/93001", "source": "secalert@redhat.com" }, { "url": "http://git.savannah.gnu.org/cgit/gpsd.git/commit/?id=dd9c3c2830cb8f8fd8491ce68c82698dc5538f50", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ] }, { "url": "http://lists.nongnu.org/archive/html/gpsd-dev/2013-05/msg00000.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://openwall.com/lists/oss-security/2013/05/02/20", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://openwall.com/lists/oss-security/2013/05/08/1", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://ubuntu.com/usn/usn-1820-1", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.osvdb.org/93000", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.osvdb.org/93001", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }