CVE-2012-5303 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5303): Monkey HTTP Daemon 0.9.3 might allow local users to overwrite arbitrary files via a symlink attack on a PID file, as demonstrated by a pathname different from the default /var/run/monkey.pid pathname. CVE-2012-4443 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4443): Monkey HTTP Daemon 0.9.3 uses a real UID of root and a real GID of root during execution of CGI scripts, which might allow local users to gain privileges by leveraging cgi-bin write access. CVE-2012-4442 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4442): Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check. Anthony, can you please check these affect any of the versions in the tree?
Thanks for the report. There are no vulnerable versions in the tree.
(In reply to comment #1) > Thanks for the report. There are no vulnerable versions in the tree. Thanks for checking!