Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-0774 (GCVE-0-2007-0774)
Vulnerability from cvelistv5 – Published: 2007-03-04 22:00 – Updated: 2024-08-07 12:34- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:34:20.277Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html"
},
{
"name": "RHSA-2007:0096",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0096.html"
},
{
"name": "ADV-2007-0809",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0809"
},
{
"name": "tomcat-mapuritoworker-bo(32794)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32794"
},
{
"name": "24558",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24558"
},
{
"name": "1017719",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017719"
},
{
"name": "20070302 ZDI-07-008: Apache Tomcat JK Web Server Connector Long URL Stack Overflow Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/461734/100/0/threaded"
},
{
"name": "24398",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24398"
},
{
"name": "20080130 Cisco Wireless Control System Tomcat mod_jk.so Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-008.html"
},
{
"name": "ADV-2007-3386",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name": "oval:org.mitre.oval:def:5513",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513"
},
{
"name": "27037",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27037"
},
{
"name": "28711",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28711"
},
{
"name": "SSRT071447",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "HPSBUX02262",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-jk.html"
},
{
"name": "ADV-2008-0331",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0331"
},
{
"name": "22791",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22791"
},
{
"name": "GLSA-200703-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [25/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [18/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [20/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [30/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-02T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-13T16:10:21.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html"
},
{
"name": "RHSA-2007:0096",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0096.html"
},
{
"name": "ADV-2007-0809",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0809"
},
{
"name": "tomcat-mapuritoworker-bo(32794)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32794"
},
{
"name": "24558",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24558"
},
{
"name": "1017719",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017719"
},
{
"name": "20070302 ZDI-07-008: Apache Tomcat JK Web Server Connector Long URL Stack Overflow Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/461734/100/0/threaded"
},
{
"name": "24398",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24398"
},
{
"name": "20080130 Cisco Wireless Control System Tomcat mod_jk.so Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-008.html"
},
{
"name": "ADV-2007-3386",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name": "oval:org.mitre.oval:def:5513",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513"
},
{
"name": "27037",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27037"
},
{
"name": "28711",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28711"
},
{
"name": "SSRT071447",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "HPSBUX02262",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-jk.html"
},
{
"name": "ADV-2008-0331",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0331"
},
{
"name": "22791",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22791"
},
{
"name": "GLSA-200703-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [25/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [18/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [20/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [30/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2007-0774",
"datePublished": "2007-03-04T22:00:00.000Z",
"dateReserved": "2007-02-06T00:00:00.000Z",
"dateUpdated": "2024-08-07T12:34:20.277Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2007-0774",
"date": "2026-05-14",
"epss": "0.88357",
"percentile": "0.99507"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3575A1AB-10E9-4B7F-80CE-CFB9172F6C70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9387C92-E2E8-4FB5-8B1D-B4DED16A01C2\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de b\\u00fafer basado en pila en la funci\\u00f3n map_uri_to_worker (native/common/jk_uri_worker_map.c) en mod_jk.so para Apache Tomcat JK Web Server Connector 1.2.19 y 1.2.20, tal y como se usa en Tomcat 4.1.34 y 5.5.20, permite a atacantes remotos ejecutar c\\u00f3digo de su elecci\\u00f3n a trav\\u00e9s de una URL que dispara el desbordamiento de b\\u00fafer en una rutina del mapa del trabajador URI.\"}]",
"id": "CVE-2007-0774",
"lastModified": "2024-11-21T00:26:42.840",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
"published": "2007-03-04T22:19:00.000",
"references": "[{\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/24398\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/24558\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/27037\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28711\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://securitytracker.com/id?1017719\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://tomcat.apache.org/security-jk.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0096.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/461734/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/22791\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/0809\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3386\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0331\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.zerodayinitiative.com/advisories/ZDI-07-008.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/32794\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/24398\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/24558\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/27037\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28711\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1017719\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://tomcat.apache.org/security-jk.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0096.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/461734/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/22791\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/0809\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3386\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0331\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.zerodayinitiative.com/advisories/ZDI-07-008.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/32794\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2007-0774\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-03-04T22:19:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n map_uri_to_worker (native/common/jk_uri_worker_map.c) en mod_jk.so para Apache Tomcat JK Web Server Connector 1.2.19 y 1.2.20, tal y como se usa en Tomcat 4.1.34 y 5.5.20, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una URL que dispara el desbordamiento de b\u00fafer en una rutina del mapa del trabajador URI.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3575A1AB-10E9-4B7F-80CE-CFB9172F6C70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9387C92-E2E8-4FB5-8B1D-B4DED16A01C2\"}]}]}],\"references\":[{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24398\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24558\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27037\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28711\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1017719\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://tomcat.apache.org/security-jk.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0096.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/461734/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/22791\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0809\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3386\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0331\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-07-008.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/32794\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24398\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27037\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1017719\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://tomcat.apache.org/security-jk.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0096.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/461734/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/22791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0809\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3386\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0331\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-07-008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/32794\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
OPENSUSE-SU-2024:10625-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "apache2-mod_jk-1.2.48-2.9 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the apache2-mod_jk-1.2.48-2.9 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10625",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10625-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-0774 page",
"url": "https://www.suse.com/security/cve/CVE-2007-0774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11759 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1323/"
}
],
"title": "apache2-mod_jk-1.2.48-2.9 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10625-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_jk-1.2.48-2.9.aarch64",
"product": {
"name": "apache2-mod_jk-1.2.48-2.9.aarch64",
"product_id": "apache2-mod_jk-1.2.48-2.9.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_jk-1.2.48-2.9.ppc64le",
"product": {
"name": "apache2-mod_jk-1.2.48-2.9.ppc64le",
"product_id": "apache2-mod_jk-1.2.48-2.9.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_jk-1.2.48-2.9.s390x",
"product": {
"name": "apache2-mod_jk-1.2.48-2.9.s390x",
"product_id": "apache2-mod_jk-1.2.48-2.9.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_jk-1.2.48-2.9.x86_64",
"product": {
"name": "apache2-mod_jk-1.2.48-2.9.x86_64",
"product_id": "apache2-mod_jk-1.2.48-2.9.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_jk-1.2.48-2.9.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64"
},
"product_reference": "apache2-mod_jk-1.2.48-2.9.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_jk-1.2.48-2.9.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le"
},
"product_reference": "apache2-mod_jk-1.2.48-2.9.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_jk-1.2.48-2.9.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x"
},
"product_reference": "apache2-mod_jk-1.2.48-2.9.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_jk-1.2.48-2.9.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64"
},
"product_reference": "apache2-mod_jk-1.2.48-2.9.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-0774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-0774"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-0774",
"url": "https://www.suse.com/security/cve/CVE-2007-0774"
},
{
"category": "external",
"summary": "SUSE Bug 248157 for CVE-2007-0774",
"url": "https://bugzilla.suse.com/248157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2007-0774"
},
{
"cve": "CVE-2018-11759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11759"
}
],
"notes": [
{
"category": "general",
"text": "The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11759",
"url": "https://www.suse.com/security/cve/CVE-2018-11759"
},
{
"category": "external",
"summary": "SUSE Bug 1114612 for CVE-2018-11759",
"url": "https://bugzilla.suse.com/1114612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-11759"
},
{
"cve": "CVE-2018-1323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1323"
}
],
"notes": [
{
"category": "general",
"text": "The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42 that normalised the requested path before matching it to the URI-worker map did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via IIS, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing Tomcat via the reverse proxy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1323",
"url": "https://www.suse.com/security/cve/CVE-2018-1323"
},
{
"category": "external",
"summary": "SUSE Bug 1085220 for CVE-2018-1323",
"url": "https://bugzilla.suse.com/1085220"
},
{
"category": "external",
"summary": "SUSE Bug 1114612 for CVE-2018-1323",
"url": "https://bugzilla.suse.com/1114612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.aarch64",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.ppc64le",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.s390x",
"openSUSE Tumbleweed:apache2-mod_jk-1.2.48-2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1323"
}
]
}
RHSA-2007:0096
Vulnerability from csaf_redhat - Published: 2007-03-02 18:30 - Updated: 2025-11-21 17:31Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated mod_jk packages that fix a security issue are now available for Red\nHat Application Stack v1.1.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "mod_jk is a Tomcat connector that can be used to communicate between Tomcat\nand the Apache HTTP Server 2. mod_jk was first distributed with Red Hat\nApplication Stack version 1.1 released on 19 February 2007.\n\nA stack overflow flaw was found in the URI handler of mod_jk. A remote\nattacker could visit a carefully crafted URL being handled by mod_jk and\ntrigger this flaw, which could lead to the execution of arbitrary code as the\n\u0027apache\u0027 user. (CVE-2007-0774)\n\nUsers of mod_jk should upgrade to these updated packages, which contain a\nbackported patch to correct this issue.\n\nRed Hat would like to thank TippingPoint and the Zero Day Initiative for\nreporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0096",
"url": "https://access.redhat.com/errata/RHSA-2007:0096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "230045",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=230045"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0096.json"
}
],
"title": "Red Hat Security Advisory: mod_jk security update",
"tracking": {
"current_release_date": "2025-11-21T17:31:23+00:00",
"generator": {
"date": "2025-11-21T17:31:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0096",
"initial_release_date": "2007-03-02T18:30:00+00:00",
"revision_history": [
{
"date": "2007-03-02T18:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-03-02T13:30:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:31:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product": {
"name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_stack:1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product": {
"name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_stack:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Stack"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"product_id": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1.el4s1.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"product_id": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1.el4s1.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"product_id": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1.el4s1.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"product_id": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1.el4s1.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"product_id": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1.el4s1.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"product": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"product_id": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1.el4s1.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-0:1.2.20-1.el4s1.2.src",
"product": {
"name": "mod_jk-0:1.2.20-1.el4s1.2.src",
"product_id": "mod_jk-0:1.2.20-1.el4s1.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.20-1.el4s1.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.20-1.el4s1.2.src as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src"
},
"product_reference": "mod_jk-0:1.2.20-1.el4s1.2.src",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.20-1.el4s1.2.src as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src"
},
"product_reference": "mod_jk-0:1.2.20-1.el4s1.2.src",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-0774",
"discovery_date": "2007-02-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618272"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src",
"4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src",
"4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0774"
},
{
"category": "external",
"summary": "RHBZ#1618272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0774",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0774"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0774",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0774"
}
],
"release_date": "2007-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-03-02T18:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src",
"4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src",
"4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0096"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
}
]
}
RHSA-2007_0164
Vulnerability from csaf_redhat - Published: 2007-04-12 23:31 - Updated: 2024-11-22 00:55Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated mod_jk packages that fix a security issue are now available for Red\nHat Application Server v2.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "mod_jk is a Tomcat connector that can be used to communicate between Tomcat\nand the Apache HTTP Server 2.\n\nA stack overflow flaw was found in the URI handler of mod_jk. A remote\nattacker could visit a carefully crafted URL being handled by mod_jk and\ntrigger this flaw, which could lead to the execution of arbitrary code as the\n\u0027apache\u0027 user. (CVE-2007-0774)\n\nUsers of mod_jk should upgrade to these updated packages, which contain a\nbackported patch to correct this issue.\n\nRed Hat would like to thank TippingPoint and the Zero Day Initiative for\nreporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0164",
"url": "https://access.redhat.com/errata/RHSA-2007:0164"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "236182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=236182"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0164.json"
}
],
"title": "Red Hat Security Advisory: mod_jk security update",
"tracking": {
"current_release_date": "2024-11-22T00:55:50+00:00",
"generator": {
"date": "2024-11-22T00:55:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2007:0164",
"initial_release_date": "2007-04-12T23:31:00+00:00",
"revision_history": [
{
"date": "2007-04-12T23:31:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-04-12T19:31:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:55:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Server v2 4AS",
"product": {
"name": "Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4ES",
"product": {
"name": "Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4WS",
"product": {
"name": "Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Server"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-0:1.2.20-1jpp_1rh.src",
"product": {
"name": "mod_jk-0:1.2.20-1jpp_1rh.src",
"product_id": "mod_jk-0:1.2.20-1jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.20-1jpp_1rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"product": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"product_id": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1jpp_1rh?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"product_id": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1jpp_1rh?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"product_id": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1jpp_1rh?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"product_id": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1jpp_1rh?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"product_id": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1jpp_1rh?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"product_id": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1jpp_1rh?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"product": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"product_id": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1jpp_1rh?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"product_id": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1jpp_1rh?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"product_id": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1jpp_1rh?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"product": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"product_id": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1jpp_1rh?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"product_id": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1jpp_1rh?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"product_id": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1jpp_1rh?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.20-1jpp_1rh.src as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src"
},
"product_reference": "mod_jk-0:1.2.20-1jpp_1rh.src",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.20-1jpp_1rh.src as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src"
},
"product_reference": "mod_jk-0:1.2.20-1jpp_1rh.src",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.20-1jpp_1rh.src as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src"
},
"product_reference": "mod_jk-0:1.2.20-1jpp_1rh.src",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4WS-RHAPS2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-0774",
"discovery_date": "2007-02-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618272"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0774"
},
{
"category": "external",
"summary": "RHBZ#1618272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0774",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0774"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0774",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0774"
}
],
"release_date": "2007-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-04-12T23:31:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0164"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
}
]
}
RHSA-2007:0164
Vulnerability from csaf_redhat - Published: 2007-04-12 23:31 - Updated: 2025-11-21 17:31Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated mod_jk packages that fix a security issue are now available for Red\nHat Application Server v2.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "mod_jk is a Tomcat connector that can be used to communicate between Tomcat\nand the Apache HTTP Server 2.\n\nA stack overflow flaw was found in the URI handler of mod_jk. A remote\nattacker could visit a carefully crafted URL being handled by mod_jk and\ntrigger this flaw, which could lead to the execution of arbitrary code as the\n\u0027apache\u0027 user. (CVE-2007-0774)\n\nUsers of mod_jk should upgrade to these updated packages, which contain a\nbackported patch to correct this issue.\n\nRed Hat would like to thank TippingPoint and the Zero Day Initiative for\nreporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0164",
"url": "https://access.redhat.com/errata/RHSA-2007:0164"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "236182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=236182"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0164.json"
}
],
"title": "Red Hat Security Advisory: mod_jk security update",
"tracking": {
"current_release_date": "2025-11-21T17:31:27+00:00",
"generator": {
"date": "2025-11-21T17:31:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0164",
"initial_release_date": "2007-04-12T23:31:00+00:00",
"revision_history": [
{
"date": "2007-04-12T23:31:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-04-12T19:31:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:31:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Server v2 4AS",
"product": {
"name": "Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4ES",
"product": {
"name": "Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4WS",
"product": {
"name": "Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Server"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-0:1.2.20-1jpp_1rh.src",
"product": {
"name": "mod_jk-0:1.2.20-1jpp_1rh.src",
"product_id": "mod_jk-0:1.2.20-1jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.20-1jpp_1rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"product": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"product_id": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1jpp_1rh?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"product_id": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1jpp_1rh?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"product_id": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1jpp_1rh?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"product_id": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1jpp_1rh?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"product_id": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1jpp_1rh?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"product_id": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1jpp_1rh?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"product": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"product_id": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1jpp_1rh?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"product_id": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1jpp_1rh?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"product_id": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1jpp_1rh?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"product": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"product_id": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1jpp_1rh?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"product_id": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1jpp_1rh?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"product_id": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1jpp_1rh?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.20-1jpp_1rh.src as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src"
},
"product_reference": "mod_jk-0:1.2.20-1jpp_1rh.src",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.20-1jpp_1rh.src as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src"
},
"product_reference": "mod_jk-0:1.2.20-1jpp_1rh.src",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.20-1jpp_1rh.src as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src"
},
"product_reference": "mod_jk-0:1.2.20-1jpp_1rh.src",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64 as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"relates_to_product_reference": "4WS-RHAPS2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-0774",
"discovery_date": "2007-02-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618272"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0774"
},
{
"category": "external",
"summary": "RHBZ#1618272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0774",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0774"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0774",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0774"
}
],
"release_date": "2007-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-04-12T23:31:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4AS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4ES-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-0:1.2.20-1jpp_1rh.src",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-ap20-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-debuginfo-0:1.2.20-1jpp_1rh.x86_64",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.i386",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ia64",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.ppc",
"4WS-RHAPS2:mod_jk-manual-0:1.2.20-1jpp_1rh.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0164"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
}
]
}
RHSA-2007_0096
Vulnerability from csaf_redhat - Published: 2007-03-02 18:30 - Updated: 2024-11-22 00:55Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated mod_jk packages that fix a security issue are now available for Red\nHat Application Stack v1.1.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "mod_jk is a Tomcat connector that can be used to communicate between Tomcat\nand the Apache HTTP Server 2. mod_jk was first distributed with Red Hat\nApplication Stack version 1.1 released on 19 February 2007.\n\nA stack overflow flaw was found in the URI handler of mod_jk. A remote\nattacker could visit a carefully crafted URL being handled by mod_jk and\ntrigger this flaw, which could lead to the execution of arbitrary code as the\n\u0027apache\u0027 user. (CVE-2007-0774)\n\nUsers of mod_jk should upgrade to these updated packages, which contain a\nbackported patch to correct this issue.\n\nRed Hat would like to thank TippingPoint and the Zero Day Initiative for\nreporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0096",
"url": "https://access.redhat.com/errata/RHSA-2007:0096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "230045",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=230045"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0096.json"
}
],
"title": "Red Hat Security Advisory: mod_jk security update",
"tracking": {
"current_release_date": "2024-11-22T00:55:45+00:00",
"generator": {
"date": "2024-11-22T00:55:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2007:0096",
"initial_release_date": "2007-03-02T18:30:00+00:00",
"revision_history": [
{
"date": "2007-03-02T18:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-03-02T13:30:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:55:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product": {
"name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_stack:1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product": {
"name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_stack:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Stack"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"product_id": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1.el4s1.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"product_id": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1.el4s1.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"product_id": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1.el4s1.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"product": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"product_id": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.20-1.el4s1.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"product": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"product_id": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.20-1.el4s1.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"product": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"product_id": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.20-1.el4s1.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_jk-0:1.2.20-1.el4s1.2.src",
"product": {
"name": "mod_jk-0:1.2.20-1.el4s1.2.src",
"product_id": "mod_jk-0:1.2.20-1.el4s1.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.20-1.el4s1.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.20-1.el4s1.2.src as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src"
},
"product_reference": "mod_jk-0:1.2.20-1.el4s1.2.src",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.20-1.el4s1.2.src as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src"
},
"product_reference": "mod_jk-0:1.2.20-1.el4s1.2.src",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386"
},
"product_reference": "mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-0774",
"discovery_date": "2007-02-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618272"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src",
"4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src",
"4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0774"
},
{
"category": "external",
"summary": "RHBZ#1618272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0774",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0774"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0774",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0774"
}
],
"release_date": "2007-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-03-02T18:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src",
"4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"4AS-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-0:1.2.20-1.el4s1.2.src",
"4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-ap20-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-debuginfo-0:1.2.20-1.el4s1.2.x86_64",
"4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.i386",
"4ES-RHWAS:mod_jk-manual-0:1.2.20-1.el4s1.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0096"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
}
]
}
GHSA-5CWP-C46G-8V55
Vulnerability from github – Published: 2022-05-01 17:47 – Updated: 2022-05-01 17:47Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
{
"affected": [],
"aliases": [
"CVE-2007-0774"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2007-03-04T22:19:00Z",
"severity": "HIGH"
},
"details": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.",
"id": "GHSA-5cwp-c46g-8v55",
"modified": "2022-05-01T17:47:02Z",
"published": "2022-05-01T17:47:02Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0774"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32794"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513"
},
{
"type": "WEB",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24398"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24558"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27037"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28711"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1017719"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-jk.html"
},
{
"type": "WEB",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml"
},
{
"type": "WEB",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0096.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/461734/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/22791"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/0809"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/0331"
},
{
"type": "WEB",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-008.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2007-AVI-108
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité présente dans Tomcat JK Web Server Connector permettrait à un utilisateur distant de réaliser un déni de service ou d'exécuter du code arbitraire.
Description
Une mauvaise gestion des adresses réticulaires (URL) dans la bibliothèque mod_jk.so permettrait à un utilisateur distant malintentionné d'exécuter du code arbitraire ou de réaliser un déni de service par le biais d'une adresse réticulaire spécialement conçue.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tomcat 4.1.34 ;",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Tomcat JK Web Server Connector 1.2.19 ;",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Tomcat JK Web Server Connector 1.2.20 ;",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Tomcat 5.5.20.",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne mauvaise gestion des adresses r\u00e9ticulaires (URL) dans la\nbiblioth\u00e8que mod_jk.so permettrait \u00e0 un utilisateur distant\nmalintentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire ou de r\u00e9aliser un d\u00e9ni de\nservice par le biais d\u0027une adresse r\u00e9ticulaire sp\u00e9cialement con\u00e7ue.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-0774",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0774"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200703-16 du 16 mars 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml"
},
{
"title": "Liste des changements apport\u00e9s \u00e0 la version 1.2.21 d\u0027Apache Tomcat Connector :",
"url": "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco 20080130 du 30 janvier 2008 :",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080093f040.shtml#@"
}
],
"reference": "CERTA-2007-AVI-108",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-03-05T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Gentoo.",
"revision_date": "2007-03-26T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Cisco.",
"revision_date": "2008-02-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans Tomcat JK Web Server Connector\npermettrait \u00e0 un utilisateur distant de r\u00e9aliser un d\u00e9ni de service ou\nd\u0027ex\u00e9cuter du code arbitraire.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Apache Tomcat",
"vendor_advisories": [
{
"published_at": null,
"title": "Liste des changements apport\u00e9s \u00e0 la version 1.2.21 d\u0027Apache Tomcat Connector",
"url": null
}
]
}
CERTA-2007-AVI-108
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité présente dans Tomcat JK Web Server Connector permettrait à un utilisateur distant de réaliser un déni de service ou d'exécuter du code arbitraire.
Description
Une mauvaise gestion des adresses réticulaires (URL) dans la bibliothèque mod_jk.so permettrait à un utilisateur distant malintentionné d'exécuter du code arbitraire ou de réaliser un déni de service par le biais d'une adresse réticulaire spécialement conçue.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tomcat 4.1.34 ;",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Tomcat JK Web Server Connector 1.2.19 ;",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Tomcat JK Web Server Connector 1.2.20 ;",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Tomcat 5.5.20.",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne mauvaise gestion des adresses r\u00e9ticulaires (URL) dans la\nbiblioth\u00e8que mod_jk.so permettrait \u00e0 un utilisateur distant\nmalintentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire ou de r\u00e9aliser un d\u00e9ni de\nservice par le biais d\u0027une adresse r\u00e9ticulaire sp\u00e9cialement con\u00e7ue.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-0774",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0774"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200703-16 du 16 mars 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml"
},
{
"title": "Liste des changements apport\u00e9s \u00e0 la version 1.2.21 d\u0027Apache Tomcat Connector :",
"url": "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco 20080130 du 30 janvier 2008 :",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080093f040.shtml#@"
}
],
"reference": "CERTA-2007-AVI-108",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-03-05T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Gentoo.",
"revision_date": "2007-03-26T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Cisco.",
"revision_date": "2008-02-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans Tomcat JK Web Server Connector\npermettrait \u00e0 un utilisateur distant de r\u00e9aliser un d\u00e9ni de service ou\nd\u0027ex\u00e9cuter du code arbitraire.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Apache Tomcat",
"vendor_advisories": [
{
"published_at": null,
"title": "Liste des changements apport\u00e9s \u00e0 la version 1.2.21 d\u0027Apache Tomcat Connector",
"url": null
}
]
}
FKIE_CVE-2007-0774
Vulnerability from fkie_nvd - Published: 2007-03-04 22:19 - Updated: 2026-04-23 00:35| Vendor | Product | Version | |
|---|---|---|---|
| apache | tomcat_jk_web_server_connector | 1.2.19 | |
| apache | tomcat_jk_web_server_connector | 1.2.20 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "3575A1AB-10E9-4B7F-80CE-CFB9172F6C70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "A9387C92-E2E8-4FB5-8B1D-B4DED16A01C2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n map_uri_to_worker (native/common/jk_uri_worker_map.c) en mod_jk.so para Apache Tomcat JK Web Server Connector 1.2.19 y 1.2.20, tal y como se usa en Tomcat 4.1.34 y 5.5.20, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una URL que dispara el desbordamiento de b\u00fafer en una rutina del mapa del trabajador URI."
}
],
"id": "CVE-2007-0774",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-03-04T22:19:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/24398"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/24558"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/27037"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28711"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1017719"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html"
},
{
"source": "secalert@redhat.com",
"url": "http://tomcat.apache.org/security-jk.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml"
},
{
"source": "secalert@redhat.com",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0096.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/461734/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/22791"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2007/0809"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/0331"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-008.html"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32794"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/24398"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/24558"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/27037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28711"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1017719"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://tomcat.apache.org/security-jk.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0096.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/461734/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22791"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0809"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32794"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2007-0774
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2007-0774",
"description": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.",
"id": "GSD-2007-0774",
"references": [
"https://www.suse.com/security/cve/CVE-2007-0774.html",
"https://access.redhat.com/errata/RHSA-2007:0164",
"https://access.redhat.com/errata/RHSA-2007:0096",
"https://packetstormsecurity.com/files/cve/CVE-2007-0774"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-0774"
],
"details": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.",
"id": "GSD-2007-0774",
"modified": "2023-12-13T01:21:35.190331Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-0774",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795",
"refsource": "MISC",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "http://secunia.com/advisories/27037",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27037"
},
{
"name": "http://tomcat.apache.org/security-jk.html",
"refsource": "MISC",
"url": "http://tomcat.apache.org/security-jk.html"
},
{
"name": "http://www.vupen.com/english/advisories/2007/3386",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name": "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html",
"refsource": "MISC",
"url": "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html"
},
{
"name": "http://secunia.com/advisories/24398",
"refsource": "MISC",
"url": "http://secunia.com/advisories/24398"
},
{
"name": "http://secunia.com/advisories/24558",
"refsource": "MISC",
"url": "http://secunia.com/advisories/24558"
},
{
"name": "http://secunia.com/advisories/28711",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28711"
},
{
"name": "http://securitytracker.com/id?1017719",
"refsource": "MISC",
"url": "http://securitytracker.com/id?1017719"
},
{
"name": "http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml",
"refsource": "MISC",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml"
},
{
"name": "http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml",
"refsource": "MISC",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-0096.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0096.html"
},
{
"name": "http://www.securityfocus.com/archive/1/461734/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/461734/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/22791",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/22791"
},
{
"name": "http://www.vupen.com/english/advisories/2007/0809",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2007/0809"
},
{
"name": "http://www.vupen.com/english/advisories/2008/0331",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/0331"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-008.html",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-008.html"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32794",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32794"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-0774"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-008.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-008.html"
},
{
"name": "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html"
},
{
"name": "http://tomcat.apache.org/security-jk.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://tomcat.apache.org/security-jk.html"
},
{
"name": "GLSA-200703-16",
"refsource": "GENTOO",
"tags": [],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml"
},
{
"name": "RHSA-2007:0096",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0096.html"
},
{
"name": "22791",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/22791"
},
{
"name": "1017719",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1017719"
},
{
"name": "24398",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/24398"
},
{
"name": "24558",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/24558"
},
{
"name": "27037",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/27037"
},
{
"name": "20080130 Cisco Wireless Control System Tomcat mod_jk.so Vulnerability",
"refsource": "CISCO",
"tags": [],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml"
},
{
"name": "28711",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28711"
},
{
"name": "ADV-2007-3386",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name": "ADV-2008-0331",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/0331"
},
{
"name": "SSRT071447",
"refsource": "HP",
"tags": [],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "ADV-2007-0809",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/0809"
},
{
"name": "tomcat-mapuritoworker-bo(32794)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32794"
},
{
"name": "oval:org.mitre.oval:def:5513",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513"
},
{
"name": "20070302 ZDI-07-008: Apache Tomcat JK Web Server Connector Long URL Stack Overflow Vulnerability",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/461734/100/0/threaded"
},
{
"name": "https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:17Z",
"publishedDate": "2007-03-04T22:19Z"
}
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.