Vulnerabilities > CVE-2003-1083 - Unspecified vulnerability in Tildeslash Monit

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
tildeslash
nessus
exploit available

Summary

Stack-based buffer overflow in Monit 1.4 to 4.1 allows remote attackers to execute arbitrary code via a long HTTP request.

Exploit-Db

  • descriptionMonit <= 4.1 Remote Root Buffer Overflow Exploit. CVE-2003-1083. Remote exploit for linux platform
    idEDB-ID:173
    last seen2016-01-31
    modified2004-04-09
    published2004-04-09
    reportergsicht
    sourcehttps://www.exploit-db.com/download/173/
    titleMonit <= 4.1 - Remote Root Buffer Overflow Exploit
  • descriptionMonit 1.4/2.x/3/4 Overly Long HTTP Request Buffer Overrun Vulnerability. CVE-2003-1083. Remote exploit for linux platform
    idEDB-ID:23397
    last seen2016-02-02
    modified2003-11-24
    published2003-11-24
    reporterShadowinteger
    sourcehttps://www.exploit-db.com/download/23397/
    titleMonit 1.4/2.x/3/4 Overly Long HTTP Request Buffer Overrun Vulnerability

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200403-14.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200403-14 (Multiple Security Vulnerabilities in Monit) A denial of service may occur due to Monit not sanitizing remotely supplied HTTP parameters before passing them to memory allocation functions. This could allow an attacker to cause an unexpected condition that could lead to the Monit daemon crashing. An overly long http request method may cause a buffer overflow due to Monit performing insufficient bounds checking when handling HTTP requests. Impact : An attacker may crash the Monit daemon to create a denial of service condition or cause a buffer overflow that would allow arbitrary code to be executed with root privileges. Workaround : A workaround is not currently known for this issue. All users are advised to upgrade to the latest version of the affected package.
last seen2020-06-01
modified2020-06-02
plugin id14465
published2004-08-30
reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/14465
titleGLSA-200403-14 : Multiple Security Vulnerabilities in Monit