SHARE
Facebook X Pinterest WhatsApp

Gentoo Linux Advisories: gallery, monkeyd

Written By
thumbnail
Web Webster
Web Webster
Feb 12, 2004

Gentoo Linux Security Advisory GLSA 200402-04 http://security.gentoo.org


Severity: Normal
Title: Gallery <= 1.4.1 remote exploit vulnerability
Date: February 11, 2004
Bugs: #39638
ID: 200402-04


Synopsis

The Gallery developers have discovered a potentially serious
security flaw in Gallery 1.3.1, 1.3.2, 1.3.3, 1.4 and 1.4.1 which
can a remote exploit of your webserver.

Background

Gallery is an open source image management system written in
PHP. More information is available at http://gallery.sourceforge.net.

Description

Starting in the 1.3.1 release, Gallery includes code to simulate
the behaviour of the PHP ‘register_globals’ variable in
environments where that setting is disabled. It is simulated by
extracting the values of the various $HTTP_ global variables into
the global namespace.

Impact

A crafted URL such as
http://example.com/gallery/init.php?HTTP_POST_VARS=xxx causes the
‘register_globals’ simulation code to overwrite the $HTTP_POST_VARS
which, when it is extracted, will deliver the given payload. If the
payload compromises $GALLERY_BASEDIR then the malicious user can
perform a PHP injection exploit and gain remote access to the
webserver with PHP user UID access rights.

Workaround

The workaround for the vulnerability is to replace “init.php”
and “setup/init.php” with the files in the following ZIP file:

http://prdownloads.sourceforge.net/gallery/patch_1.4.1-to-1.4.1-pl1.zip?download

Resolution

All users are encouraged to upgrade their gallery
installation:

# emerge sync
# emerge -p ">=app-misc/gallery-1.4.1_p1"
# emerge ">=app-misc/gallery-1.4.1_p1"

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.


Gentoo Linux Security Advisory GLSA 200402-03 http://security.gentoo.org


Severity: Normal
Title: Monkeyd Denial of Service vulnerability
Date: February 11, 2004
Bugs: #41156
ID: 200402-03


Synopsis

A bug in get_real_string() function allows for a Denial of
Service attack to be launched against the webserver.

Background

The Monkey HTTP daemon is a Web server written in C that works
under Linux and is based on the HTTP/1.1 protocol. It aims to
develop a fast, efficient and small web server.

Description

A bug in the URI processing of incoming requests allows for a
Denial of Service to be launched against the webserver, which may
cause the server to crash or behave sporadically.

Impact

Although there are no public exploits known for bug, users are
recommended to upgrade to ensure the security of their
infrastructure.

Workaround

There is no immediate workaround; a software upgrade is
required. The vulnerable function in the code has been
rewritten.

Resolution

All users are recommended to upgrade monkeyd to 0.8.2:

# emerge sync
# emerge -pv ">=net-www/monkeyd-0.8.2"
# emerge ">=net-www/monkeyd-0.8.2"

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

A Thorough Approach to Improve the Privacy and Security of Your Linux PC
Damien
Oct 24, 2024
Several Russian Maintainers Removed From Linux Kernel Due To Compliance Concerns
Senthil Kumar
Oct 23, 2024
OpenSSH Splits Again: New Authentication Binary Unveiled
Bobby Borisov
Oct 16, 2024
13 Best Free and Open Source Anti-Malware Tools
webmaster
Oct 14, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.