| Vulnerability Name: | CVE-2007-6258 (CCN-40614) | ||||||||
| Assigned: | 2007-12-05 | ||||||||
| Published: | 2008-02-14 | ||||||||
| Updated: | 2022-02-03 | ||||||||
| Summary: | Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Host header. | ||||||||
| CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 6.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
8.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-119 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2007-6258 Source: CCN Type: SA41953 Fujitsu Interstage Products Host Header Buffer Overflow Vulnerabilities Source: SREASON Type: Broken Link 3661 Source: CCN Type: Apache Tomcat Downloads Web page Tomcat Connectors (mod_jk) Downloads Source: CCN Type: BIG-IP Web Site F5 BIG-IP Source: CCN Type: Fujitsu Web Site Interstage Application Server: Buffer Overflow Vulnerability(CVE-2007-6258) Source: CCN Type: IOActive Security Advisory Multiple Buffer Overflows in legacy mod_jk2 apache module 2.0.3-DEV and earlier Source: MISC Type: Third Party Advisory http://www.ioactive.com/pdfs/mod_jk2.pdf Source: MISC Type: Broken Link http://www.ioactive.com/vulnerabilities/mod_jk2LegacyBufferOverflowAdvisory.pdf Source: CCN Type: US-CERT VU#771937 Apache mod_jk2 host header buffer overflow Source: CERT-VN Type: Patch, Third Party Advisory, US Government Resource VU#771937 Source: CCN Type: OSVDB ID: 43189 Apache mod_jk2 Host Header Multiple Fields Remote Overflow Source: BUGTRAQ Type: Third Party Advisory, VDB Entry 20080212 IOActive Security Advisory: Legacy mod_jk2 Buffer Overflow Source: BID Type: Patch, Third Party Advisory, VDB Entry 27752 Source: CCN Type: BID-27752 Apache mod_jk2 Host Header Multiple Stack Based Buffer Overflow Vulnerabilities Source: VUPEN Type: URL Repurposed ADV-2008-0572 Source: XF Type: UNKNOWN apache-modjk2-bo(40614) Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [2008-03-31] Source: EXPLOIT-DB Type: Third Party Advisory, VDB Entry 5330 Source: EXPLOIT-DB Type: Third Party Advisory, VDB Entry 5386 | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||