vendor:
Tomcat Connectors
by:
INetCop Security
9.3
CVSS
HIGH
Remote Buffer Overflow
119
CWE
Product Name: Tomcat Connectors
Affected Version From: Apache/2.0.53 (Unix) mod_jk2/2.0.2
Affected Version To: Apache/2.0.53 (Unix) mod_jk2/2.0.2
Patch Exists: YES
Related CWE: CVE-2008-2370
CPE: a:apache:tomcat_connectors:jk2-2.0.2
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0602/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2008-2938/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2008-2938/, https://www.rapid7.com/db/vulnerabilities/apple-osx-tomcat-cve-2008-2938/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0005-cve-2008-2370/, https://www.rapid7.com/db/vulnerabilities/vmsa-2009-0016-5-update-apache-tomcat-version-cve-2008-2370/, https://www.rapid7.com/db/vulnerabilities/apple-osx-tomcat-cve-2008-2370/, https://www.rapid7.com/db/vulnerabilities/vmsa-2009-0002-cve-2008-2370/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2008-2370/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2008-2370/, https://www.rapid7.com/db/vulnerabilities/apache-tomcat-cve-2008-2370/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0648/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0864/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0877/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-1007/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2008-2370/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0862/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2008
Fedora Core 6,7,8 (exec-shield) based Apache Tomcat Connector jk2-2.0.2(mod_jk2) remote overflow exploit
This exploit targets Apache Tomcat Connector jk2-2.0.2(mod_jk2) on Fedora Core 6,7,8 (exec-shield) based systems. It allows an attacker to gain remote access to the target system by sending a specially crafted request to the vulnerable server. The exploit is available in the form of a tarball containing a C source code file.
Mitigation:
Upgrade to the latest version of Apache Tomcat Connector jk2-2.0.2(mod_jk2) and apply the latest security patches.