Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Host header.
References
Link | Resource |
---|---|
http://securityreason.com/securityalert/3661 | Broken Link |
http://www.ioactive.com/pdfs/mod_jk2.pdf | Third Party Advisory |
http://www.ioactive.com/vulnerabilities/mod_jk2LegacyBufferOverflowAdvisory.pdf | Broken Link |
http://www.kb.cert.org/vuls/id/771937 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/archive/1/487983/100/100/threaded | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/27752 | Patch Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2008/0572 | URL Repurposed |
https://www.exploit-db.com/exploits/5330 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/5386 | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: certcc
Published: 2008-02-18T23:00:00
Updated: 2018-10-15T20:57:01
Reserved: 2007-12-05T00:00:00
Link: CVE-2007-6258
JSON object: View
NVD Information
Status : Analyzed
Published: 2008-02-19T00:00:00.000
Modified: 2022-02-03T19:43:57.970
Link: CVE-2007-6258
JSON object: View
Redhat Information
No data.
CWE