Vulnerability Description
Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Host header.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Mod Jk | 2.0 |
| F5 | Big-Ip | 9.2.3.30 |
Related Weaknesses (CWE)
References
- http://securityreason.com/securityalert/3661Broken Link
- http://www.ioactive.com/pdfs/mod_jk2.pdfThird Party Advisory
- http://www.ioactive.com/vulnerabilities/mod_jk2LegacyBufferOverflowAdvisory.pdfBroken Link
- http://www.kb.cert.org/vuls/id/771937PatchThird Party AdvisoryUS Government Resource
- http://www.securityfocus.com/archive/1/487983/100/100/threadedThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/27752PatchThird Party AdvisoryVDB Entry
- http://www.vupen.com/english/advisories/2008/0572URL Repurposed
- https://www.exploit-db.com/exploits/5330Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/5386Third Party AdvisoryVDB Entry
- http://securityreason.com/securityalert/3661Broken Link
- http://www.ioactive.com/pdfs/mod_jk2.pdfThird Party Advisory
- http://www.ioactive.com/vulnerabilities/mod_jk2LegacyBufferOverflowAdvisory.pdfBroken Link
- http://www.kb.cert.org/vuls/id/771937PatchThird Party AdvisoryUS Government Resource
- http://www.securityfocus.com/archive/1/487983/100/100/threadedThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/27752PatchThird Party AdvisoryVDB Entry
FAQ
What is CVE-2007-6258?
CVE-2007-6258 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Ho...
How severe is CVE-2007-6258?
CVE-2007-6258 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6258?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Mod Jk, F5 Big-Ip.