Gentoo Archives: gentoo-announce

From: Kurt Lieber <klieber@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200404-16 ] Multiple new security vulnerabilities in monit
Date: Mon, 19 Apr 2004 09:19:55
Message-Id: 20040419091749.GY16487@mail.lieber.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200404-16
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Multiple new security vulnerabilities in monit
9
10 Date: April 19, 2004
11 Bugs: #47631
12 ID: 200404-16
13
14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
15
16 Synopsis
17 ========
18
19 Two new vulnerabilities have been found in the HTTP interface of monit,
20 possibly leading to denial of service or execution of arbitrary code.
21
22 Background
23 ==========
24
25 Monit is a system administration utility that allows management and
26 monitoring of processes, files, directories and devices on a Unix
27 system.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 app-admin/monit <= 4.2 >= 4.2.1
36
37 Description
38 ===========
39
40 Monit has several vulnerabilities in its HTTP interface : a buffer
41 overflow vulnerability in the authentication handling code and a
42 off-by-one error in the POST method handling code.
43
44 Impact
45 ======
46
47 An attacker may exploit the off-by-one error to crash the Monit daemon
48 and create a denial of service condition, or cause a buffer overflow
49 that would allow arbitrary code to be executed with root privileges.
50
51 Workaround
52 ==========
53
54 A workaround is not currently known for this issue. All users are
55 advised to upgrade to the latest version of the affected package.
56
57 Resolution
58 ==========
59
60 Monit users should upgrade to version 4.2.1 or later:
61
62 # emerge sync
63
64 # emerge -pv ">=app-admin/monit-4.2.1"
65 # emerge ">=app-admin/monit-4.2.1"
66
67 References
68 ==========
69
70 [ 1 ] http://www.tildeslash.com/monit/secadv_20040305.txt
71
72 Availability
73 ============
74
75 This GLSA and any updates to it are available for viewing at
76 the Gentoo Security Website:
77
78 http://security.gentoo.org/glsa/glsa-200404-16.xml
79
80 Concerns?
81 =========
82
83 Security is a primary focus of Gentoo Linux and ensuring the
84 confidentiality and security of our users machines is of utmost
85 importance to us. Any security concerns should be addressed to
86 security@g.o or alternatively, you may file a bug at
87 http://bugs.gentoo.org.
88
89 License
90 =======
91
92 Copyright 2004 Gentoo Technologies, Inc; referenced text
93 belongs to its owner(s).
94
95 The contents of this document are licensed under the
96 Creative Commons - Attribution / Share Alike license.
97
98 http://creativecommons.org/licenses/by-sa/1.0