Monkey HTTP Daemon无HOST字段拒绝服务攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1107706 漏洞类型 输入验证错误
发布时间 2004-02-11 更新时间 2020-03-30
CVE编号 CVE-2004-0276 CNNVD-ID CNNVD-200411-068
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/23686
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200411-068
|漏洞详情
Monkey HTTP Daemon (monkeyd) 0.8.1及之前版本中的‘get_real_string’函数存在输入验证错误漏洞。远程攻击者可借助HTTP请求利用该漏洞造成拒绝服务(崩溃)。
|漏洞EXP
source: http://www.securityfocus.com/bid/9642/info

Monkey HTTP Daemon is prone to a denial of service attacks. HTTP GET requests, which do not include a 'Host' header field, will trigger this condition.

The server will need to be restarted to regain normal functionality.

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23686.rar
|参考资料

来源:BID
名称:9642
链接:http://www.securityfocus.com/bid/9642
来源:XF
名称:monkey-getrealstring-dos(15187)
链接:http://xforce.iss.net/xforce/xfdb/15187
来源:monkeyd.sourceforge.net
链接:http://monkeyd.sourceforge.net/
来源:BUGTRAQ
名称:20040211DenialofServiceinMonkeyhttpd<=0.8.1
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=107652610506968&w=2
来源:aluigi.altervista.org
链接:http://aluigi.altervista.org/poc/monkeydos.zip
来源:OSVDB
名称:3921
链接:http://www.osvdb.org/3921