Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 19 Aug 2014 11:50:02 -0400 (EDT)
From: cve-assign@...re.org
To: mattd@...fuzz.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, eduardo@...key.io
Subject: Re: CVE request / advisory: Monkey web server <= v1.5.2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://github.com/monkey/monkey/commit/b2d0e6f92310bb14a15aa2f8e96e1fb5379776dd
> http://monkey-project.com/Announcements/v1.5.3
> 
> simple denial-of-service
> 
> any HTTP requests that result in a custom error message being returned
> cause a file descriptor ... to be leaked

Use CVE-2014-5336.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJT83F0AAoJEKllVAevmvms8N0H/jUJyJCQI6zg5JD0y6ZaCG5o
jrTFWNLM6T+7PeLVyYMnuhAxcI7pLh0UqPbpYAZTiAULCFo+WtrD5qXEUaIiu/9L
STRuUsoLwwBBjZY0LJJ6t2tCJ2p+YFw3dq9lDJOHydcJ6rKzZcmwApgyYb+Azpvo
VCSjtEZj5jbh73WpRbevxoRr4lmvyZ8J0i9321sHvqVAGZVZl0cuDiXb3qP++v8E
FjgCMhCzQr/IP17iigov5mOXNPg6z4K4z0EyrTolsa3T7Azo9WvciZG/bfJfVWuA
oH2jmUruCA+qREVcpqThxaX3Fbda8SLV/vvGvSa8My64Jwh8iwpP8v7hdGkri/Y=
=pDlF
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ