The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Apache Tomcat JK Web Server Connector Long URL Stack Overflow


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 4 Mar 2007 16:30:45 +0200
Subject: [NEWS] Apache Tomcat JK Web Server Connector Long URL Stack Overflow
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070304141306.38ACB5816@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Apache Tomcat JK Web Server Connector Long URL Stack Overflow
------------------------------------------------------------------------


SUMMARY

Apache  <http://tomcat.apache.org/>; Tomcat is the servlet container that 
is used in the official Reference Implementation for the Java Servlet and 
JavaServer Pages technologies.

This vulnerability allows remote attackers to execute arbitrary code on 
vulnerable installations of Apache Tomcat JK Web Server Connector. 
Authentication is not required to exploit this vulnerability.

DETAILS

Affected Products:
 * Tomcat JK Web Server Connector 1.2.19
 * Tomcat JK Web Server Connector 1.2.20
 * Tomcat 4.1.34
 * Tomcat 5.5.20

This vulnerability allows remote attackers to execute arbitrary code on 
vulnerable installations of Apache Tomcat JK Web Server Connector. 
Authentication is not required to exploit this vulnerability.

The specific flaw exists in the URI handler for the mod_jk.so library, 
map_uri_to_worker(), defined in native/common/jk_uri_worker_map.c. When 
parsing a long URL request, the URI worker map routine performs an unsafe 
memory copy. This results in a stack overflow condition which can be 
leveraged to execute arbitrary code.

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774>; 
CVE-2007-0774

Disclosure Timeline:
 * 2007.02.16 - Vulnerability reported to vendor
 * 2007.02.26 - Digital Vaccine released to TippingPoint customers
 * 2007.03.02 - Coordinated public release of advisory


ADDITIONAL INFORMATION

The information has been provided by Zero Day Initiative (ZDI).
The original article can be found at:
 <http://www.zerodayinitiative.com/advisories/ZDI-07-008.html>; 
http://www.zerodayinitiative.com/advisories/ZDI-07-008.html




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру