CVE Vulnerabilities

CVE-2005-1122

Use of Externally-Controlled Format String

Published: Apr 14, 2005 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Format string vulnerability in cgi.c for Monkey daemon (monkeyd) before 0.9.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP GET request containing double-encoded format string specifiers (aka double expansion error).

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
MonkeyMonkey-project*0.9.0 (including)
MonkeyMonkey-project0.1.1 (including)0.1.1 (including)
MonkeyMonkey-project0.5.2 (including)0.5.2 (including)
MonkeyMonkey-project0.6.0 (including)0.6.0 (including)
MonkeyMonkey-project0.6.1 (including)0.6.1 (including)
MonkeyMonkey-project0.6.2 (including)0.6.2 (including)
MonkeyMonkey-project0.6.3 (including)0.6.3 (including)
MonkeyMonkey-project0.7.0 (including)0.7.0 (including)
MonkeyMonkey-project0.7.1 (including)0.7.1 (including)
MonkeyMonkey-project0.7.2 (including)0.7.2 (including)
MonkeyMonkey-project0.8.0 (including)0.8.0 (including)
MonkeyMonkey-project0.8.1 (including)0.8.1 (including)
MonkeyMonkey-project0.8.2 (including)0.8.2 (including)
MonkeyMonkey-project0.8.3 (including)0.8.3 (including)
MonkeyMonkey-project0.8.4 (including)0.8.4 (including)
MonkeyMonkey-project0.8.4-2 (including)0.8.4-2 (including)
MonkeyMonkey-project0.8.5 (including)0.8.5 (including)

Potential Mitigations

References