Summary: | <www-servers/monkeyd-1.2.2 : Denial of Service Vulnerability (CVE-2013-3724) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | blueness |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.1337day.com/exploit/20830 | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 472400 |
Description
Agostino Sarubbo
![]() This is fixed in the recent versions I added to the tree, but there are still more security bugs open on monkeyd. We should not wait any longer. TARGET: "amd64 arm ppc ppc64 x86" Note this also takes care of bugs #472400 and #472644. It does not take care of a couple other security issues. amd64 stable x86 stable ppc stable ppc64 stable arm stable Note that monkeyd needs a GLSA anyway, bug 472400 is a B2. GLSA vote: yes CVE-2013-3724 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3724): The mk_request_header_process function in mk_request.c in Monkey 1.1.1 allows remote attackers to cause a denial of service (thread crash and service outage) via a '\0' character in an HTTP request. Added to existing request. This issue was resolved and addressed in GLSA 201309-17 at http://security.gentoo.org/glsa/glsa-201309-17.xml by GLSA coordinator Chris Reffett (creffett). |