Monkeyd Denial of Service vulnerability — GLSA 200402-03

A bug in get_real_string() function allows for a Denial of Service attack to be launched against the webserver.

Affected Packages

www-servers/monkeyd on all architectures
Affected versions < 0.8.2
Unaffected versions >= 0.8.2

Background

The Monkey HTTP daemon is a Web server written in C that works under Linux and is based on the HTTP/1.1 protocol. It aims to develop a fast, efficient and small web server.

Description

A bug in the URI processing of incoming requests allows for a Denial of Service to be launched against the webserver, which may cause the server to crash or behave sporadically.

Impact

Although there are no public exploits known for bug, users are recommended to upgrade to ensure the security of their infrastructure.

Workaround

There is no immediate workaround; a software upgrade is required. The vulnerable function in the code has been rewritten.

Resolution

All users are recommended to upgrade monkeyd to 0.8.2:

 # emerge sync
 # emerge -pv ">=www-servers/monkeyd-0.8.2"
 # emerge ">=www-servers/monkeyd-0.8.2"

References

Release Date
February 11, 2004

Latest Revision
February 11, 2004: 01

Severity
normal

Exploitable
remote

Bugzilla entries