Korean
<< Back
VID 22439
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Apache webserver, according to its banner, has a buffer overflow vulnerability in the Apache mod_jk module. Apache Tomcat JK Web Server Connector versions prior to 1.2.21, as used in Tomcat 4.1.34 and 5.5.20, is vulnerable to a stack-based buffer overflow vulnerability, caused by improper bounds checking by the map_uri_to_worker() function in the mod_jk.so library. By sending an overly long URL request that triggers the overflow in a URI worker map routine, a remote attacker could execute arbitrary code on the system or cause the affected server to crash.

* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.

* References:
http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html
http://tomcat.apache.org/security-jk.html
http://www.zerodayinitiative.com/advisories/ZDI-07-008.html
http://www.securityfocus.com/archive/1/461734/30/0/threaded
http://www.frsirt.com/english/advisories/2007/0809
http://securitytracker.com/id?1017719
http://secunia.com/advisories/24558
http://secunia.com/advisories/24398

* Platforms Affected:
Apache Software Foundation, Tomcat Connector versions prior to 1.2.21
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat JK Web Server Connector (1.2.21 or later), available from the Apache Tomcat Web site at http://tomcat.apache.org/download-connectors.cgi

For Red Hat Linux:
Upgrade to an updated mod_jk package version, as listed in Red Hat Security Advisory RHSA-2007:0096-2 at http://www.redhat.com/support/errata/RHSA-2007-0096.html

For Gentoo Linux:
Upgrade to the fixed version of Squid, as listed in Gentoo Linux Security Announcement GLSA 200703-16 at http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml
Related URL CVE-2007-0774 (CVE)
Related URL 22791 (SecurityFocus)
Related URL 32794 (ISS)