Apache TomCat mod_jk < 1.2.21 Worker Map Remote Overflow

High Nessus Network Monitor Plugin ID 3932

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running the Apache Tomcat web server with mod_jk. mod_jk is reported to be vulnerable to a remote buffer overflow. It is alleged that an attacker sending a URI of greater than 4095 bytes can corrupt the application memory. Successful exploitation would result in the attacker executing arbitrary code on the remote web server.

Solution

Upgrade to version 1.2.21 or higher.

See Also

http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html

Plugin Details

Severity: High

ID: 3932

File Name: 3932.prm

Family: Web Servers

Published: 2007/03/05

Modified: 2016/01/15

Dependencies: 3057

Nessus ID: 24813

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 7.3

Temporal Score: 6.8

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (Apache mod_jk 1.2.20 Buffer Overflow)

Reference Information

CVE: CVE-2007-0774

BID: 22791

OSVDB: 33855