SB2012100501 - Multiple vulnerabilities in Monkey



SB2012100501 - Multiple vulnerabilities in Monkey

Published: October 5, 2012 Updated: August 11, 2020

Security Bulletin ID SB2012100501
CSH Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 67% Medium 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-4442)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check.


2) Link following (CVE-ID: CVE-2012-5303)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Monkey HTTP Daemon 0.9.3 might allow local users to overwrite arbitrary files via a symlink attack on a PID file, as demonstrated by a pathname different from the default /var/run/monkey.pid pathname.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-4443)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Monkey HTTP Daemon 0.9.3 uses a real UID of root and a real GID of root during execution of CGI scripts, which might allow local users to gain privileges by leveraging cgi-bin write access.


Remediation

Install update from vendor's website.