Apache TomCat mod_jk < 1.2.21 Worker Map Remote Overflow

high Nessus Network Monitor Plugin ID 3932

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running the Apache Tomcat web server with mod_jk. mod_jk is reported to be vulnerable to a remote buffer overflow. It is alleged that an attacker sending a URI of greater than 4095 bytes can corrupt the application memory. Successful exploitation would result in the attacker executing arbitrary code on the remote web server.

Solution

Upgrade to version 1.2.21 or higher.

See Also

http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html

Plugin Details

Severity: High

ID: 3932

Family: Web Servers

Published: 3/5/2007

Updated: 3/6/2019

Nessus ID: 24813

Risk Information

VPR

Risk Factor: Medium

Score: 6.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (Apache mod_jk 1.2.20 Buffer Overflow)

Reference Information

CVE: CVE-2007-0774

BID: 22791