Buffer overflow in PostMethod() function for Monkey HTTP Daemon (monkeyd) 0.6.1 and earlier allows remote attackers to execute arbitrary code via a POST request with a large body.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0029.html | Exploit Patch Vendor Advisory |
http://marc.info/?l=bugtraq&m=105094204204166&w=2 | |
http://marc.info/?l=bugtraq&m=105154473526898&w=2 | |
http://monkeyd.sourceforge.net/Changelog.txt | |
http://www.securityfocus.com/bid/7202 | Exploit Patch Vendor Advisory |
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0029.html | Exploit Patch Vendor Advisory |
http://marc.info/?l=bugtraq&m=105094204204166&w=2 | |
http://marc.info/?l=bugtraq&m=105154473526898&w=2 | |
http://monkeyd.sourceforge.net/Changelog.txt | |
http://www.securityfocus.com/bid/7202 | Exploit Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0029.html - Exploit, Patch, Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=105094204204166&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=105154473526898&w=2 - | |
References | () http://monkeyd.sourceforge.net/Changelog.txt - | |
References | () http://www.securityfocus.com/bid/7202 - Exploit, Patch, Vendor Advisory |
Information
Published : 2003-05-12 04:00
Updated : 2024-11-20 23:44
NVD link : CVE-2003-0218
Mitre link : CVE-2003-0218
CVE.ORG link : CVE-2003-0218
JSON object : View
Products Affected
monkey-project
- monkey
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer