~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Candidate: CVE-2013-3843
PublicDate: 2014-06-13
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3843
 http://bugs.monkey-project.com/ticket/182
 https://github.com/monkey/monkey/issues/88
 http://xforce.iss.net/xforce/xfdb/84755
 http://secunia.com/advisories/53697
 http://monkey-project.com/Announcements/v1.2.1
 http://archives.neohapsis.com/archives/bugtraq/2013-06/0015.html
Description:
 Stack-based buffer overflow in the mk_request_header_process function in
 mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote
 attackers to cause a denial of service (crash) and possibly execute
 arbitrary code via a crafted HTTP header.
Ubuntu-Description:
Notes:
Bugs:
Priority: medium
Discovered-by:
Assigned-to:

Patches_monkey:
upstream_monkey: released (1.2.1)
lucid_monkey: ignored (reached end-of-life)
precise_monkey: ignored (reached end-of-life)
precise/esm_monkey: DNE (precise was needs-triage)
saucy_monkey: DNE
trusty_monkey: DNE
utopic_monkey: DNE
vivid_monkey: DNE
vivid/stable-phone-overlay_monkey: DNE
vivid/ubuntu-core_monkey: DNE
wily_monkey: DNE
xenial_monkey: DNE
yakkety_monkey: DNE
zesty_monkey: DNE
devel_monkey: DNE