Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.812786
Kategorie:Web Servers
Titel:Apache Tomcat JK Connector (mod_jk) 1.2.0 - 1.2.41 Buffer Overflow Vulnerability - Windows
Zusammenfassung:Apache Tomcat JK Connector (mod_jk) is prone to a buffer; overflow vulnerability.
Beschreibung:Summary:
Apache Tomcat JK Connector (mod_jk) is prone to a buffer
overflow vulnerability.

Vulnerability Insight:
The flaw exists as IIS/ISAPI specific code implements special
handling when a virtual host is present. The virtual host name and the URI are concatenated to
create a virtual host mapping rule. The length checks prior to writing to the target buffer for
this rule did not take account of the length of the virtual host name.

Vulnerability Impact:
Successfully exploiting this issue will allow remote attackers to
execute arbitrary code in the context of the user running the application. Failed exploit attempts
will likely result in denial-of-service conditions.

Affected Software/OS:
Apache Tomcat JK Connector (mod_jk) version 1.2.0 through
1.2.41.

Solution:
Update to version 1.2.42 or later.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-6808
BugTraq ID: 93429
http://www.securityfocus.com/bid/93429
http://seclists.org/fulldisclosure/2016/Oct/44
http://packetstormsecurity.com/files/139071/Apache-Tomcat-JK-ISAPI-Connector-1.2.41-Buffer-Overflow.html
http://www.openwall.com/lists/oss-security/2016/10/06/4
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c@%3Cdev.tomcat.apache.org%3E
RedHat Security Advisories: RHSA-2016:2957
http://rhn.redhat.com/errata/RHSA-2016-2957.html
RedHat Security Advisories: RHSA-2017:0193
https://access.redhat.com/errata/RHSA-2017:0193
RedHat Security Advisories: RHSA-2017:0194
https://access.redhat.com/errata/RHSA-2017:0194
http://www.securitytracker.com/id/1036969
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.