Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in Monopd, which can be exploited by malicious people to cause a DoS (Denial of Service).
dea077610b977861bee50f96e6b8442f3d4f35fbd06d55e7fdfc7d46722b2a13
TITLE:
Monopd String Parsing Denial of Service Vulnerability
SECUNIA ADVISORY ID:
SA19133
VERIFY ADVISORY:
http://secunia.com/advisories/19133/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
monopd 0.x
http://secunia.com/product/2548/
DESCRIPTION:
Luigi Auriemma has reported a vulnerability in Monopd, which can be
exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the server when
parsing an overly long input string received from the client. This
can be exploited to cause the server to consume large amount of CPU
and memory resources, and potentially causing a DoS.
The vulnerability has been reported in version 0.9.3 and prior.
SOLUTION:
Apply patch.
http://www.robertjohnkaper.com/downloads/atlantik/monopd-0.9.3-dosfix.diff
PROVIDED AND/OR DISCOVERED BY:
Luigi Auriemma
ORIGINAL ADVISORY:
http://aluigi.altervista.org/adv/monopdx-adv.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------