Apache TomCat mod_jk < 1.2.21 Worker Map Remote Overflow

High Nessus Network Monitor Plugin ID 3932


The remote host is vulnerable to a buffer overflow.


The remote host is running the Apache Tomcat web server with mod_jk. mod_jk is reported to be vulnerable to a remote buffer overflow. It is alleged that an attacker sending a URI of greater than 4095 bytes can corrupt the application memory. Successful exploitation would result in the attacker executing arbitrary code on the remote web server.


Upgrade to version 1.2.21 or higher.

See Also


Plugin Details

Severity: High

ID: 3932

File Name: 3932.prm

Family: Web Servers

Published: 2007/03/05

Modified: 2016/01/15

Dependencies: 3057

Nessus ID: 24813

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 7.3

Temporal Score: 6.8


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (Apache mod_jk 1.2.20 Buffer Overflow)

Reference Information

CVE: CVE-2007-0774

BID: 22791

OSVDB: 33855