Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-17937 |
CWE-ID | CWE-121 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
gpsd Client/Desktop applications / Other client software microjson Client/Desktop applications / Office applications |
Vendor | Eric S. Raymond |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU17714
Risk: Medium
CVSSv4.0: 5.2 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-17937
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows an adjacent attacker to gain elevated privileges on the target system.
The vulnerability exists due to a boundary error when handling malicious input. An adjacent attacker can trigger stack-based buffer overflow and execute arbitrary code via traffic on Port 2947/TCP or crafted JSON inputs.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate gpsd to version 3.18 or later.
Update microjson to version 1.4.
gpsd: 2.90 - 3.17
microjson: 1.0 - 1.3
CPE2.3https://ics-cert.us-cert.gov/advisories/ICSA-18-310-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.