CVE Vulnerabilities

CVE-2005-1122

Use of Externally-Controlled Format String

Published: Apr 14, 2005 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

Format string vulnerability in cgi.c for Monkey daemon (monkeyd) before 0.9.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP GET request containing double-encoded format string specifiers (aka double expansion error).

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

Name Vendor Start Version End Version
Monkey Monkey-project * 0.9.0 (including)
Monkey Monkey-project 0.1.1 (including) 0.1.1 (including)
Monkey Monkey-project 0.5.2 (including) 0.5.2 (including)
Monkey Monkey-project 0.6.0 (including) 0.6.0 (including)
Monkey Monkey-project 0.6.1 (including) 0.6.1 (including)
Monkey Monkey-project 0.6.2 (including) 0.6.2 (including)
Monkey Monkey-project 0.6.3 (including) 0.6.3 (including)
Monkey Monkey-project 0.7.0 (including) 0.7.0 (including)
Monkey Monkey-project 0.7.1 (including) 0.7.1 (including)
Monkey Monkey-project 0.7.2 (including) 0.7.2 (including)
Monkey Monkey-project 0.8.0 (including) 0.8.0 (including)
Monkey Monkey-project 0.8.1 (including) 0.8.1 (including)
Monkey Monkey-project 0.8.2 (including) 0.8.2 (including)
Monkey Monkey-project 0.8.3 (including) 0.8.3 (including)
Monkey Monkey-project 0.8.4 (including) 0.8.4 (including)
Monkey Monkey-project 0.8.4-2 (including) 0.8.4-2 (including)
Monkey Monkey-project 0.8.5 (including) 0.8.5 (including)

Potential Mitigations

References