gpsd Open Source Project
A stack buffer overflow exists in gpsd versions 2.90–3.17 and microjson versions 1.0–1.3 in the parsing of GPS/NMEA protocol messages. An attacker on an adjacent network can send a malicious message to the gpsd service to trigger the overflow, leading to remote code execution, data exfiltration, or denial of service via crash. High skill is required to exploit. Platforms with stack protectors and local variable reordering limit impact to availability only. No known public exploits exist at the time of this advisory.
- Network access to gpsd service (default port 2947)
- Adjacent network access (same LAN or directly connected network)
- Device running vulnerable gpsd version 2.90–3.17 or microjson 1.0–1.3
- No authentication required to send messages to gpsd
Patching may require device reboot — plan for process interruption
/api/v1/advisories/549178e4-93ad-4633-8c01-2c07333b9a52Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.