CVE-2013-3843
Published: 13 June 2014
Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.
Priority
Status
Package | Release | Status |
---|---|---|
monkey Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Ignored
(end of life)
|
|
saucy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(1.2.1)
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
References
- http://bugs.monkey-project.com/ticket/182
- https://github.com/monkey/monkey/issues/88
- http://xforce.iss.net/xforce/xfdb/84755
- http://secunia.com/advisories/53697
- http://monkey-project.com/Announcements/v1.2.1
- http://archives.neohapsis.com/archives/bugtraq/2013-06/0015.html
- https://www.cve.org/CVERecord?id=CVE-2013-3843
- NVD
- Launchpad
- Debian