Описание
Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.
Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2013-3843
- https://github.com/monkey/monkey/issues/88
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84755
- http://archives.neohapsis.com/archives/bugtraq/2013-06/0015.html
- http://bugs.monkey-project.com/ticket/182
- http://monkey-project.com/Announcements/v1.2.1
- http://secunia.com/advisories/53697
Связанные уязвимости
Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.
Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.
Stack-based buffer overflow in the mk_request_header_process function ...