Description
Monkey daemon (monkeyd) before 0.9.1 allows remote attackers to cause a denial of service (memory corruption) via a request for a zero byte file.
Product(s):
- Monkey HTTP Daemon
- Monkey-Project Monkey
- Monkey-Project Monkey 0.1.1
- Monkey-Project Monkey 0.1.4
- Monkey-Project Monkey 0.5.0
- Monkey-Project Monkey 0.5.1
- Monkey-Project Monkey 0.5.2
- Monkey-Project Monkey 0.6.0
- Monkey-Project Monkey 0.6.1
- Monkey-Project Monkey 0.6.2
- Monkey-Project Monkey 0.6.3
- Monkey-Project Monkey 0.7.0
- Monkey-Project Monkey 0.7.1
- Monkey-Project Monkey 0.7.2
- Monkey-Project Monkey 0.8.0
- Monkey-Project Monkey 0.8.1
- Monkey-Project Monkey 0.8.2
- Monkey-Project Monkey 0.8.3
- Monkey-Project Monkey 0.8.4
- Monkey-Project Monkey 0.8.4 2
- Monkey-Project Monkey 0.8.5
- Monkey-Project Monkey 0.9.0
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-1123, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-1123 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- http://webappsec.pbworks.com/Buffer-Overflow
- https://capec.mitre.org/data/definitions/10.html
- https://capec.mitre.org/data/definitions/100.html
- https://capec.mitre.org/data/definitions/123.html
- https://capec.mitre.org/data/definitions/14.html
- https://capec.mitre.org/data/definitions/24.html
- https://capec.mitre.org/data/definitions/42.html
- https://capec.mitre.org/data/definitions/44.html
- https://capec.mitre.org/data/definitions/45.html
- https://capec.mitre.org/data/definitions/46.html
- https://capec.mitre.org/data/definitions/47.html
- https://capec.mitre.org/data/definitions/8.html
- https://capec.mitre.org/data/definitions/9.html
- https://nvd.nist.gov/vuln/detail/CVE-2005-1123