CVE-2004-1388
BerliOS GPD daemon <2.7 - RCE
Title source: llmDescription
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/16853
exploitdb
WORKING POC
VERIFIED
by Yann Senotier · rubyremotelinux
https://www.exploit-db.com/exploits/10029
metasploit
WORKING POC
NORMAL
rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/gpsd_format_string.rb
References (5)
Scores
EPSS
0.7409
EPSS Percentile
98.8%
Details
Status
published
Products (17)
berlios/gps_daemon
1.9.0
berlios/gps_daemon
1.25
berlios/gps_daemon
1.26
berlios/gps_daemon
1.91
berlios/gps_daemon
1.92
berlios/gps_daemon
1.93
berlios/gps_daemon
1.94
berlios/gps_daemon
1.95
berlios/gps_daemon
1.96
berlios/gps_daemon
1.97
... and 7 more
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026