Apache mod_jk2 < 2.0.4 Multiple Overflows

Medium Nessus Network Monitor Plugin ID 4376

Synopsis

The remote host is affected by multiple buffer overflow vulnerabilities.

Description

The remote host is running Apache web server with mod_jk2, a connector that connects a web server such as Apache. According to its banner, the version of mod_jk2 installed is affected by multiple buffer overflow vulnerabilities. An attacker may be able to exploit these vulnerabilities to cause a denial-of-service condition or execute arbitrary code subject to the privileges of the user running the Apache process.

Solution

Upgrade to version 2.0.4 or higher.

See Also

http://www.milw0rm.com/exploits/5330

http://today.java.net/pub/n/mod_jk22.0.4

http://www.securityfocus.com/archive/1/[email protected]

Plugin Details

Severity: Medium

ID: 4376

File Name: 4376.prm

Family: Web Servers

Published: 2008/02/13

Modified: 2016/11/23

Dependencies: 3057

Nessus ID: 31786

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS3#AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Reference Information

CVE: CVE-2007-6258

BID: 27752

OSVDB: 43189