Summary
Monkey HTTP Daemon is prone to a denial-of-service vulnerability.
Remote attackers can exploit this issue to cause the application to crash, denying service to legitimate users.
Versions prior to Monkey HTTP Daemon 0.9.3 are vulnerable.
Solution
Updates are available
please see the references for more information.
References
- http://census-labs.com/news/2009/12/14/monkey-httpd/
- http://groups.google.com/group/monkeyd/browse_thread/thread/055b4e9b83973861/c0e013d166ae1eb3?show_docid=c0e013d166ae1eb3
- http://monkeyd.sourceforge.net/
- http://www.securityfocus.com/archive/1/508442
- http://www.securityfocus.com/bid/37307
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- Weborf 'get_param_value()' Function HTTP Header Handling Denial Of Service Vulnerability
- Apache Open For Business Weak Password security check
- Lotus Domino administration databases
- PHP Built-in WebServer 'Content-Length' Denial of Service Vulnerability
- JBoss Enterprise Application Platform Multiple Remote Vulnerabilities