Debian DSA-1810-1 : libapache-mod-jk - information disclosure

low Nessus Plugin ID 38991

Synopsis

The remote Debian host is missing a security-related update.

Description

An information disclosure flaw was found in mod_jk, the Tomcat Connector module for Apache. If a buggy client included the 'Content-Length' header without providing request body data, or if a client sent repeated requests very quickly, one client could obtain a response intended for another client.

The oldstable distribution (etch), this problem has been fixed in version 1:1.2.18-3etch2.

Solution

Upgrade the libapache-mod-jk packages.

For the stable distribution (lenny), this problem has been fixed in version 1:1.2.26-2+lenny1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523054

https://www.debian.org/security/2009/dsa-1810

Plugin Details

Severity: Low

ID: 38991

File Name: debian_DSA-1810.nasl

Version: 1.12

Type: local

Agent: unix

Published: 6/3/2009

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libapache-mod-jk, cpe:/o:debian:debian_linux:4.0, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 6/2/2009

Reference Information

CVE: CVE-2008-5519

BID: 35169

CWE: 200

DSA: 1810