Monkeyd Denial of Service vulnerability
Gentoo Linux Security Advisory
||GLSA 200402-03 / monkeyd
||February 11, 2004
||February 11, 2004: 01
All supported architectures
A bug in get_real_string() function allows for a Denial of Service attack to be
launched against the webserver.
The Monkey HTTP daemon is a Web server written in C that works
under Linux and is based on the HTTP/1.1 protocol. It aims to develop
a fast, efficient and small web server.
A bug in the URI processing of incoming requests allows for a Denial of
Service to be launched against the webserver, which may cause the server
to crash or behave sporadically.
Although there are no public exploits known for bug, users are recommended
to upgrade to ensure the security of their infrastructure.
There is no immediate workaround; a software upgrade is
required. The vulnerable function in the code has been rewritten.
All users are recommended to upgrade monkeyd to 0.8.2:
Code Listing 3.1: Resolution
# emerge sync
# emerge -pv ">=www-servers/monkeyd-0.8.2"
# emerge ">=www-servers/monkeyd-0.8.2"