Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.812786
Category:Web Servers
Title:Apache Tomcat JK Connector (mod_jk) 1.2.0 - 1.2.41 Buffer Overflow Vulnerability - Windows
Summary:Apache Tomcat JK Connector (mod_jk) is prone to a buffer; overflow vulnerability.
Description:Summary:
Apache Tomcat JK Connector (mod_jk) is prone to a buffer
overflow vulnerability.

Vulnerability Insight:
The flaw exists as IIS/ISAPI specific code implements special
handling when a virtual host is present. The virtual host name and the URI are concatenated to
create a virtual host mapping rule. The length checks prior to writing to the target buffer for
this rule did not take account of the length of the virtual host name.

Vulnerability Impact:
Successfully exploiting this issue will allow remote attackers to
execute arbitrary code in the context of the user running the application. Failed exploit attempts
will likely result in denial-of-service conditions.

Affected Software/OS:
Apache Tomcat JK Connector (mod_jk) version 1.2.0 through
1.2.41.

Solution:
Update to version 1.2.42 or later.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-6808
BugTraq ID: 93429
http://www.securityfocus.com/bid/93429
http://seclists.org/fulldisclosure/2016/Oct/44
http://packetstormsecurity.com/files/139071/Apache-Tomcat-JK-ISAPI-Connector-1.2.41-Buffer-Overflow.html
http://www.openwall.com/lists/oss-security/2016/10/06/4
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c@%3Cdev.tomcat.apache.org%3E
RedHat Security Advisories: RHSA-2016:2957
http://rhn.redhat.com/errata/RHSA-2016-2957.html
RedHat Security Advisories: RHSA-2017:0193
https://access.redhat.com/errata/RHSA-2017:0193
RedHat Security Advisories: RHSA-2017:0194
https://access.redhat.com/errata/RHSA-2017:0194
http://www.securitytracker.com/id/1036969
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.