{"vuid":"VU#623854","idnumber":"623854","name":"Monit fails to properly handle negative Content-Length fields","keywords":["TildeSlash","Monit","DoS","denial of service","HTTP parameter","negative Content-Length field","xmalloc()"],"overview":"Monit fails to properly handle HTTP requests containing a negative Content-Length field.","clean_desc":"Monit is a utility to monitor system processes, files, directories, devices, and remote hosts. It provides a web-based interface that can be used to access the Monit server. When processing HTTP requests, Monit fails to properly sanitize the Content-Length field. By supplying a negative value for the Content-Length field of an HTTP request, an unauthenticated, remote attacker could cause the Monit daemon to crash.","impact":"A remote, unauthenticated attacker could cause the Monit daemon to crash, resulting in a denial-of-service condition.","resolution":"Upgrade\nUpgrade to Monit version 4.1.1 or later.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Evgeny Legerov of S-Quadra.","author":"This document was written by Damon Morda.","public":["http://www.tildeslash.com/monit/","http://www.tildeslash.com/monit/changes.html","http://www.s-quadra.com/advisories/Adv-20031124.txt","http://www.securityfocus.com/bid/9098","http://forums.gentoo.org/viewtopic.php?t=155764"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-03-31T16:17:19Z","publicdate":"2004-03-31T00:00:00Z","datefirstpublished":"2004-04-06T14:09:37Z","dateupdated":"2004-04-06T14:14:03Z","revision":16,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"5","cam_impact":"3","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"1.265625","cam_scorecurrentwidelyknown":"1.58203125","cam_scorecurrentwidelyknownexploited":"2.84765625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.265625,"vulnote":null}