Your one-stop web resource providing safety and security information to manufacturers

gpsd Open Source Project has a suggested mitigation to handle a stack-based buffer overflow in its gpsd, microjson, according to a report with NCCIC.

Successful exploitation of this vulnerability could allow remote code execution, data exfiltration, or denial-of service via device crash. GE Digital Cyber Security Services, working with GE-PSIRT, discovered the vulnerability.

RELATED STORIES
Pangea Patches Bypass Vulnerability
Fuji Fixes FRENIC Devices
Siemens Fixes CP1604, CP1616 Holes
Siemens has Upgrade for Intel AMT

The following versions of gpsd and microjson, an open-source GPS framework, suffer from the issue:
• gpsd, Versions 2.90 to 3.17
• microjson Versions 1.0 to 1.3

As reported on the gpsd website, gpsd can be found in many mobile embedded systems such as Android phones, drones, robot submarines, driverless cars, manned aircraft, marine navigation systems, and military vehicles.

Schneider Bold

Google has been contacted regarding this vulnerability. They have examined it and believe the vulnerability does not apply to Android.

In the vulnerability, a stack-based buffer overflow may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.

CVE-2018-17937 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 8.3.

The product mainly sees use in the communications, defense industrial base, emergency services, and transportation systems sectors. It also sees action on a global basis.

No known public exploits specifically target this vulnerability. This vulnerability is exploitable from an adjacent network. High skill level is needed to exploit.

Platforms which implement stack protector and local variable re-ordering reduce the impact of this vulnerability to availability only.

gpsd/microjson project maintainers recommend upgrading to gpsd Version 3.18 or newer and microjson 1.4 or newer to resolve this vulnerability.

For more information visit the gpsd website.

Pin It on Pinterest

Share This