Gentoo: GLSA-201309-17: Monkey HTTP Daemon: Multiple vulnerabilities
Summary
Multiple vulnerabilities have been discovered in Monkey HTTP Daemon. Please review the CVE identifiers referenced below for details.
Resolution
All Monkey HTTP Daemon users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/monkeyd-1.2.2"
References
[ 1 ] CVE-2013-2163 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2163 [ 2 ] CVE-2013-3724 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3724 [ 3 ] CVE-2013-3843 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3843
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201309-17
Concerns
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
![Dist Gentoo](/images/distros/dist-gentoo.png)
Synopsis
Multiple vulnerabilities have been discovered in Monkey HTTP Daemon, the worst of which could result in arbitrary code execution.
Background
Monkey HTTP Daemon is a lightweight and powerful web server for GNU/Linux.
Affected Packages
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-servers/monkeyd < 1.2.2 >= 1.2.2
Impact
===== A remote attacker could send a specially crafted request, resulting in possible arbitrary code execution or a Denial of Service condition.
Workaround
There is no known workaround at this time.