- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200404-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Multiple new security vulnerabilities in monit Date: April 19, 2004 Bugs: #47631 ID: 200404-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Two new vulnerabilities have been found in the HTTP interface of monit, possibly leading to denial of service or execution of arbitrary code. Background ========== Monit is a system administration utility that allows management and monitoring of processes, files, directories and devices on a Unix system. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- app-admin/monit <= 4.2 >= 4.2.1 Description =========== Monit has several vulnerabilities in its HTTP interface : a buffer overflow vulnerability in the authentication handling code and a off-by-one error in the POST method handling code. Impact ====== An attacker may exploit the off-by-one error to crash the Monit daemon and create a denial of service condition, or cause a buffer overflow that would allow arbitrary code to be executed with root privileges. Workaround ========== A workaround is not currently known for this issue. All users are advised to upgrade to the latest version of the affected package. Resolution ========== Monit users should upgrade to version 4.2.1 or later: # emerge sync # emerge -pv ">=app-admin/monit-4.2.1" # emerge ">=app-admin/monit-4.2.1" References ========== [ 1 ] http://www.tildeslash.com/monit/secadv_20040305.txt Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200404-16.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2004 Gentoo Technologies, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/1.0
Attachment:
pgp00520.pgp
Description: PGP signature