Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://ubuntu.com/usn/usn-1820-1", "name": "USN-1820-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://openwall.com/lists/oss-security/2013/05/02/20", "name": "[oss-security] 20130502 Re: CVE Request -- gpsd 3.9 fixing a denial of service flaw", "tags": [], "refsource": "MLIST"}, {"url": "http://www.osvdb.org/93001", "name": "93001", "tags": [], "refsource": "OSVDB"}, {"url": "http://lists.nongnu.org/archive/html/gpsd-dev/2013-05/msg00000.html", "name": "[gpsd-dev] 20130501 3.9 is released", "tags": [], "refsource": "MLIST"}, {"url": "http://www.osvdb.org/93000", "name": "93000", "tags": [], "refsource": "OSVDB"}, {"url": "http://git.savannah.gnu.org/cgit/gpsd.git/commit/?id=dd9c3c2830cb8f8fd8491ce68c82698dc5538f50", "name": "http://git.savannah.gnu.org/cgit/gpsd.git/commit/?id=dd9c3c2830cb8f8fd8491ce68c82698dc5538f50", "tags": ["Exploit", "Patch"], "refsource": "CONFIRM"}, {"url": "http://openwall.com/lists/oss-security/2013/05/08/1", "name": "[oss-security] 20130507 Re: CVE Request -- gpsd 3.9 fixing a denial of service flaw", "tags": [], "refsource": "MLIST"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The NMEA0183 driver in gpsd before 3.9 allows remote attackers to cause a denial of service (daemon termination) and possibly execute arbitrary code via a GPS packet with a malformed $GPGGA interpreted sentence that lacks certain fields and a terminator. NOTE: a separate issue in the AIS driver was also reported, but it might not be a vulnerability."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-20"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2013-2038", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2014-02-06T17:00Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:gpsd_project:gpsd:3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:gpsd_project:gpsd:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:gpsd_project:gpsd:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:gpsd_project:gpsd:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:gpsd_project:gpsd:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:gpsd_project:gpsd:3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:gpsd_project:gpsd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "3.8"}, {"cpe23Uri": "cpe:2.3:a:gpsd_project:gpsd:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:gpsd_project:gpsd:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2014-02-07T15:24Z"}