lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20030428084324.2106F339A7@mail1.tamperd.net> From: aliz at gentoo.org (Daniel Ahlberg) Subject: GLSA: monkeyd (200304-07) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200304-07 - - - --------------------------------------------------------------------- PACKAGE : monkeyd SUMMARY : DATE : 2003-04-28 08:43 UTC EXPLOIT : remote VERSIONS AFFECTED : <monkeyd-0.6.2 FIXED VERSION : >=snort-0.6.2 CVE : - - - --------------------------------------------------------------------- - - From advisory: "A buffer overflow vulnerability exists in Monkey's handling of forms submitted with the POST request method. The unchecked buffer lies in the PostMethod() procedure." Read the full advisory at: http://marc.theaimsgroup.com/?l=bugtraq&m=105094204204166&w=2 SOLUTION It is recommended that all Gentoo Linux users who are running net-www/monkeyd upgrade to monkeyd-0.6.3 as follows: emerge sync emerge monkeyd emerge clean - - - --------------------------------------------------------------------- aliz@...too.org - GnuPG key is available at http://cvs.gentoo.org/~aliz - - - --------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+rOmofT7nyhUpoZMRArcIAKCr6/obxva0dkO5cQkr5WSHUEbs8ACfQuPA jV0Ti3jkPMjho6avQEGOsds= =J440 -----END PGP SIGNATURE-----