Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200703-16 ] Apache JK Tomcat Connector: Remote execution of arbitrary code
Date: Fri, 16 Mar 2007 23:29:32
Message-Id: 20070316224114.GK14065@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200703-16
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Apache JK Tomcat Connector: Remote execution of arbitrary
9 code
10 Date: March 16, 2007
11 Bugs: #169433
12 ID: 200703-16
13
14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
15
16 Synopsis
17 ========
18
19 The Apache Tomcat Connector (mod_jk) contains a buffer overflow
20 vulnerability that could result in the remote execution of arbitrary
21 code.
22
23 Background
24 ==========
25
26 The Apache HTTP server is a very widely used web server. mod_jk
27 provides the JK module for connecting Tomcat and Apache using the ajp13
28 protocol.
29
30 Affected packages
31 =================
32
33 -------------------------------------------------------------------
34 Package / Vulnerable / Unaffected
35 -------------------------------------------------------------------
36 1 www-apache/mod_jk < 1.2.21-r1 >= 1.2.21-r1
37
38 Description
39 ===========
40
41 ZDI reported an unsafe memory copy in mod_jk that was discovered by an
42 anonymous researcher in the map_uri_to_worker function of
43 native/common/jk_uri_worker_map.c .
44
45 Impact
46 ======
47
48 A remote attacker can send a long URL request to an Apache server using
49 Tomcat. That can trigger the vulnerability and lead to a stack-based
50 buffer overflow, which could result in the execution of arbitrary code
51 with the permissions of the Apache user.
52
53 Workaround
54 ==========
55
56 There is no known workaround at this time.
57
58 Resolution
59 ==========
60
61 All Apache Tomcat users should upgrade to the latest version:
62
63 # emerge --sync
64 # emerge --ask --oneshot --verbose ">=www-apache/mod_jk-1.2.21-r1"
65
66 References
67 ==========
68
69 [ 1 ] CVE-2007-0774
70 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774
71
72 Availability
73 ============
74
75 This GLSA and any updates to it are available for viewing at
76 the Gentoo Security Website:
77
78 http://security.gentoo.org/glsa/glsa-200703-16.xml
79
80 Concerns?
81 =========
82
83 Security is a primary focus of Gentoo Linux and ensuring the
84 confidentiality and security of our users machines is of utmost
85 importance to us. Any security concerns should be addressed to
86 security@g.o or alternatively, you may file a bug at
87 http://bugs.gentoo.org.
88
89 License
90 =======
91
92 Copyright 2007 Gentoo Foundation, Inc; referenced text
93 belongs to its owner(s).
94
95 The contents of this document are licensed under the
96 Creative Commons - Attribution / Share Alike license.
97
98 http://creativecommons.org/licenses/by-sa/2.5