Apache mod_jk2 < 2.0.4 Multiple Overflows

medium Nessus Network Monitor Plugin ID 4376

Synopsis

The remote host is affected by multiple buffer overflow vulnerabilities.

Description

The remote host is running Apache web server with mod_jk2, a connector that connects a web server such as Apache. According to its banner, the version of mod_jk2 installed is affected by multiple buffer overflow vulnerabilities. An attacker may be able to exploit these vulnerabilities to cause a denial-of-service condition or execute arbitrary code subject to the privileges of the user running the Apache process.

Solution

Upgrade to version 2.0.4 or higher.

See Also

http://www.milw0rm.com/exploits/5330

http://today.java.net/pub/n/mod_jk22.0.4

http://www.securityfocus.com/archive/1/[email protected]

Plugin Details

Severity: Medium

ID: 4376

Family: Web Servers

Published: 2/13/2008

Updated: 3/6/2019

Nessus ID: 31786

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Reference Information

CVE: CVE-2007-6258

BID: 27752