| Vulnerability Name: | CVE-2013-3843 (CCN-84755) | ||||||||
| Assigned: | 2013-05-30 | ||||||||
| Published: | 2013-05-30 | ||||||||
| Updated: | 2020-03-26 | ||||||||
| Summary: | Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:UR)
5.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:UR)
| ||||||||
| Vulnerability Type: | CWE-119 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: BUGTRAQ Type: UNKNOWN 20130604 CVE-2013-3843 Monkey HTTPD 1.2.0 - Buffer Overflow DoS Vulnerability With Possible Arbitrary Code Execution Source: CCN Type: Monkey-Project #182 Buffer Overflow DoS Vulnerability With Possible Arbitrary Code Execution Source: CONFIRM Type: UNKNOWN http://bugs.monkey-project.com/ticket/182 Source: MITRE Type: CNA CVE-2013-3843 Source: CONFIRM Type: Vendor Advisory http://monkey-project.com/Announcements/v1.2.1 Source: CCN Type: SA53697 Monkey HTTP Daemon "mk_request_header_process()" Signedness Error Buffer Overflow Vulnerability Source: SECUNIA Type: UNKNOWN 53697 Source: CCN Type: Monkey HTTPD Web site Monkey HTTP Daemon - A Fast and Lightweight HTTP Server for GNU/Linux - Home Source: CCN Type: BID-60333 Monkey HTTP Daemon 'memcpy()' Function Buffer Overflow Vulnerability Source: XF Type: UNKNOWN monkeyhttpd-cve20133843-bo(84755) Source: XF Type: UNKNOWN monkeyhttpd-cve20133843-bo(84755) Source: CONFIRM Type: UNKNOWN https://github.com/monkey/monkey/issues/88 Source: CCN Type: Packet Storm Security [06-04-2013] Monkey 1.2.0 Buffer Overflow | ||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
| Oval Definitions | |||||||||
| |||||||||
| BACK | |||||||||