Korean
<< Back
VID 22461
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Apache web server, according to its banner, has multiple buffer overflow vulnerabilities in the mod_jk2 Apache module. mod_jk2 Apache module versions prior to 2.0.4 are vulnerable to multiple stack-based overflow vulnerabilities, caused by improper bounds checking of the Host header or Hostname within a Host header. By sending a specially-crafted request containing an overly long Host header, a remote attacker could exploit these vulnerabilities to execute arbitrary code on the system or cause the application to crash.

* Note: This check solely relied on the banner of the HTTP server to assess this vulnerability, so this might be a false positive.

* References:
http://today.java.net/pub/n/mod_jk22.0.4
http://www.securityfocus.com/archive/1/487983
http://www.milw0rm.com/exploits/5330
http://www.ioactive.com/vulnerabilities/mod_jk2LegacyBufferOverflowAdvisory.pdf
http://www.kb.cert.org/vuls/id/771937
http://www.frsirt.com/english/advisories/2008/0572

* Platforms Affected:
Apache, mod_jk2 versions prior to 2.0.4
Any operating system Any version
Recommendation Upgrade to the latest version of mod_jk2 (2.0.4 or later), available from the Apache Tomcat Downloads Web page at http://tomcat.apache.org/download-connectors.cgi
Related URL CVE-2007-6258 (CVE)
Related URL 27752 (SecurityFocus)
Related URL 40614 (ISS)