HTTP: Monkey HTTP Daemon memcpy Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the Monkey_HTTP_Daemon . A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Monkey_HTTP_Daemon.

Extended Description

Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.

Affected Products

Monkey-project monkey

References

BugTraq: 60333

CVE: CVE-2013-3843

Short Name
HTTP:MONKEY-HTTPD-BO
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2013-3843 Daemon HTTP Monkey Overflow bid:60333 memcpy
Release Date
09/05/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Monkey-project

CVSS Score

6.8

Found a potential security threat?