CVE-2013-3843

Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.
Configurations

Configuration 1 (hide)

cpe:2.3:a:monkey-project:monkey:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:54

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2013-06/0015.html - () http://archives.neohapsis.com/archives/bugtraq/2013-06/0015.html -
References () http://bugs.monkey-project.com/ticket/182 - () http://bugs.monkey-project.com/ticket/182 -
References () http://monkey-project.com/Announcements/v1.2.1 - Vendor Advisory () http://monkey-project.com/Announcements/v1.2.1 - Vendor Advisory
References () http://secunia.com/advisories/53697 - () http://secunia.com/advisories/53697 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/84755 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/84755 -
References () https://github.com/monkey/monkey/issues/88 - () https://github.com/monkey/monkey/issues/88 -

Information

Published : 2014-06-13 14:55

Updated : 2024-11-21 01:54


NVD link : CVE-2013-3843

Mitre link : CVE-2013-3843

CVE.ORG link : CVE-2013-3843


JSON object : View

Products Affected

monkey-project

  • monkey
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer