Apache Tomcat Connector mod_jk Library URL Handling Buffer Overflow Vulnerability


Description   A vulnerability has been identified in Apache Tomcat Connector, which could be exploited by attackers to compromise a vulnerable web server. This issue is due to a buffer overflow error in the mod_jk library when processing overly long URLs via the "map_uri_to_worker()" [native/common/jk_uri_worker_map.c] method, which could be exploited by remote attackers to execute arbitrary commands by sending a specially crafted request to an affected server.
     
Vulnerable Products   Vulnerable Software:
Apache Tomcat Connector (mod_jk) version 1.2.20Apache Tomcat Connector (mod_jk) version 1.2.19Apache Tomcat version 4.1.34Apache Tomcat version 5.5.20
     
Solution   Upgrade to mod_jk version 1.2.21 : http://tomcat.apache.org/download-connectors.cgi
     
CVE   CVE-2007-0774
     
References   http://tomcat.apache.org/security-jk.html
http://www.zerodayinitiative.com/advisories/ZDI-07-008.html
     
Vulnerability Manager Detection   Yes (since ASQ v3.5.0)
     
IPS Protection  
ASQ Engine alarm Available Since
Possible buffer overflow on URL
3.2.0
     


 
 
 
 
 Risk level 
Critical 

 Vulnerability First Public Report Date 
2007-03-05 

 Target Type 
Server 

 Possible exploit 
Local & Remote