8.8
CVSSv3

CVE-2018-17937

Published: 13/03/2019 Updated: 02/11/2021
CVSS v2 Base Score: 5.8 | Impact Score: 6.4 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 516
Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote malicious users to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gpsd project gpsd

microjson project microjson

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #925327 gpsd: CVE-2018-17937 Package: src:gpsd; Maintainer for src:gpsd is Bernd Zeimetz <bzed@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 23 Mar 2019 08:09:01 UTC Severity: grave Tags: security, upstream Found in versions gpsd/316-4, gpsd/317-5 Fixed in v ...