Gpsd Project

Gpsd

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.12%
  • Veröffentlicht 02.01.2026 16:17:00
  • Zuletzt bearbeitet 12.01.2026 15:33:45

gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplie...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 02.01.2026 00:00:00
  • Zuletzt bearbeitet 09.01.2026 22:07:39

An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->lengt...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 05.12.2023 12:15:43
  • Zuletzt bearbeitet 04.11.2025 20:17:07

An integer underflow vulnerability exists in the NTRIP Stream Parsing functionality of GPSd 3.25.1~dev. A specially crafted network packet can lead to memory corruption. An attacker can send a malicious packet to trigger this vulnerability.

  • EPSS 4.03%
  • Veröffentlicht 13.03.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:14

gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON i...

Exploit
  • EPSS 2.01%
  • Veröffentlicht 06.02.2014 17:00:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The NMEA0183 driver in gpsd before 3.9 allows remote attackers to cause a denial of service (daemon termination) and possibly execute arbitrary code via a GPS packet with a malformed $GPGGA interpreted sentence that lacks certain fields and a termina...