CVE-2013-3843
Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.4015 (40.2%)
Percentile: 97.4%
EPSS: 2026-05-06
Affects
monkey-project:monkeyTechnical description
Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.
Published: 6/13/2014, 2:55:12 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://archives.neohapsis.com/archives/bugtraq/2013-06/0015.html
- http://bugs.monkey-project.com/ticket/182
- http://monkey-project.com/Announcements/v1.2.1
- http://secunia.com/advisories/53697
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84755
- https://github.com/monkey/monkey/issues/88
- http://archives.neohapsis.com/archives/bugtraq/2013-06/0015.html
- http://bugs.monkey-project.com/ticket/182