This indicates an attempt to exploit a format string vulnerability in Berlios GPSD.
The vulnerability is caused by the application's failure to check user input in "gpsd.c". It allows remote attackers to execute arbitrary code via a malicious tcp packet sent to port 2947.
Berlios GPSD version 1.9.0 through version 2.7
System Compromise: remote attackers can gain control of vulnerable systems.
Upgrade to the latest version, available from the web site: