Description
Format string vulnerability in cgi.c for Monkey daemon (monkeyd) before 0.9.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP GET request containing double-encoded format string specifiers (aka "double expansion error").
Product(s):
- Monkey HTTP Daemon
- Monkey-Project Monkey
- Monkey-Project Monkey 0.1.1
- Monkey-Project Monkey 0.1.4
- Monkey-Project Monkey 0.5.0
- Monkey-Project Monkey 0.5.1
- Monkey-Project Monkey 0.5.2
- Monkey-Project Monkey 0.6.0
- Monkey-Project Monkey 0.6.1
- Monkey-Project Monkey 0.6.2
- Monkey-Project Monkey 0.6.3
- Monkey-Project Monkey 0.7.0
- Monkey-Project Monkey 0.7.1
- Monkey-Project Monkey 0.7.2
- Monkey-Project Monkey 0.8.0
- Monkey-Project Monkey 0.8.1
- Monkey-Project Monkey 0.8.2
- Monkey-Project Monkey 0.8.3
- Monkey-Project Monkey 0.8.4
- Monkey-Project Monkey 0.8.4 2
- Monkey-Project Monkey 0.8.5
- Monkey-Project Monkey 0.9.0
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-1122, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-1122 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.