CVE-2013-3843
Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.4015 (40.2%)
Percentil: 97.4%
EPSS: 2026-05-06
Afecta
monkey-project:monkeyDescripción técnica
Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.
Publicada: 13/6/2014, 14:55:12
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://archives.neohapsis.com/archives/bugtraq/2013-06/0015.html
- http://bugs.monkey-project.com/ticket/182
- http://monkey-project.com/Announcements/v1.2.1
- http://secunia.com/advisories/53697
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84755
- https://github.com/monkey/monkey/issues/88
- http://archives.neohapsis.com/archives/bugtraq/2013-06/0015.html
- http://bugs.monkey-project.com/ticket/182