Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.
References
Configurations
History
21 Nov 2024, 01:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2013-06/0015.html - | |
References | () http://bugs.monkey-project.com/ticket/182 - | |
References | () http://monkey-project.com/Announcements/v1.2.1 - Vendor Advisory | |
References | () http://secunia.com/advisories/53697 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/84755 - | |
References | () https://github.com/monkey/monkey/issues/88 - |
Information
Published : 2014-06-13 14:55
Updated : 2024-11-21 01:54
NVD link : CVE-2013-3843
Mitre link : CVE-2013-3843
CVE.ORG link : CVE-2013-3843
JSON object : View
Products Affected
monkey-project
- monkey
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer