gpsd Open Source Project has a suggested mitigation to handle a stack-based buffer overflow in its gpsd, microjson, according to a report with NCCIC.
Successful exploitation of this vulnerability could allow remote code execution, data exfiltration, or denial-of service via device crash. GE Digital Cyber Security Services, working with GE-PSIRT, discovered the vulnerability.
The following versions of gpsd and microjson, an open-source GPS framework, suffer from the issue:
• gpsd, Versions 2.90 to 3.17
• microjson Versions 1.0 to 1.3
As reported on the gpsd website, gpsd can be found in many mobile embedded systems such as Android phones, drones, robot submarines, driverless cars, manned aircraft, marine navigation systems, and military vehicles.
Google has been contacted regarding this vulnerability. They have examined it and believe the vulnerability does not apply to Android.
In the vulnerability, a stack-based buffer overflow may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.
CVE-2018-17937 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 8.3.
The product mainly sees use in the communications, defense industrial base, emergency services, and transportation systems sectors. It also sees action on a global basis.
No known public exploits specifically target this vulnerability. This vulnerability is exploitable from an adjacent network. High skill level is needed to exploit.
Platforms which implement stack protector and local variable re-ordering reduce the impact of this vulnerability to availability only.
For more information visit the gpsd website.