From aliz@gentoo.org Fri May 2 05:32:01 2003 From: Daniel Ahlberg To: bugtraq@securityfocus.com Date: Mon, 28 Apr 2003 10:49:41 +0200 Subject: GLSA: monkeyd (200304-07.1) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200304-07.1 - - - --------------------------------------------------------------------- PACKAGE : monkeyd SUMMARY : buffer overflow DATE : 2003-04-28 08:49 UTC EXPLOIT : remote VERSIONS AFFECTED : =monkeyd-0.6.2 CVE : - - - --------------------------------------------------------------------- Previous issue contained some errors. - - From advisory: "A buffer overflow vulnerability exists in Monkey's handling of forms submitted with the POST request method. The unchecked buffer lies in the PostMethod() procedure." Read the full advisory at: http://marc.theaimsgroup.com/?l=bugtraq&m=105094204204166&w=2 SOLUTION It is recommended that all Gentoo Linux users who are running net-www/monkeyd upgrade to monkeyd-0.6.3 as follows: emerge sync emerge monkeyd emerge clean - - - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz - - - --------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+rOsifT7nyhUpoZMRAlreAJ0UQiyUWazha/M0pN7I4Y0D7RHKDACfeoD6 hmP5rw4B1A62fmge6y6OiP8= =FGfW -----END PGP SIGNATURE-----