This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200906-04
(Apache Tomcat JK Connector: Information disclosure)
The Red Hat Security Response Team discovered that mod_jk does not
properly handle (1) requests setting the 'Content-Length' header while
not providing data and (2) clients sending repeated requests very
A remote attacker could send specially crafted requests or a large
number of requests at a time, possibly resulting in the disclosure of a
response intended for another client.
There is no known workaround at this time.
See also :
All Apache Tomcat JK Connector users should upgrade to the latest
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-apache/mod_jk-1.2.27'
Risk factor :
Low / CVSS Base Score : 2.6
CVSS Temporal Score : 2.3
Public Exploit Available : false