| VID |
22346 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Monkey HTTP server is vulnerable to a denial of service and a format string vulnerabilities. Monkey, developed by Eduardo Silva, is a Web server written in C that works under Linux. This is an open source project based on the HTTP/1.1 protocol. Monkey HTTP Daemon versions prior to 0.9.1 are vulnerable to a denial of service vulnerability and a format string vulnerability:
1) A syntax error within the handling of certain requests can be exploited to cause a Denial of Service by requesting a 0 byte file repeatedly. 2) A format string error in "cgi.c" due to a double expansion in the "m_build_buffer_from_buffer()" function can be exploited to execute arbitrary code via a specially crafted request containing format specifiers.
* References: http://secunia.com/advisories/14953/ http://bugs.gentoo.org/show_bug.cgi?id=87916
* Platforms Affected: Eduardo Silva, Monkey HTTP Daemon versions prior to 0.9.1 Linux Any version |
| Recommendation |
Upgrade to the latest version of Monkey HTTP Daemon (0.9.1 or later), available from the Monkey HTTP Daemon Web site at http://monkeyd.sourceforge.net |
| Related URL |
CVE-2005-1122,CVE-2005-1123 (CVE) |
| Related URL |
13187,13188 (SecurityFocus) |
| Related URL |
20106,20109 (ISS) |
|