exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ioactive-modjk2.txt

ioactive-modjk2.txt
Posted Feb 12, 2008
Site ioactive.com

IOActive Security Advisory - mod_jk2 versions prior to 2.0.4 are vulnerable to multiple stack overflow vulnerabilities. Specifically, IOActive has discovered multiple locations where these vulnerabilities are exploitable via the Host request header in any given request. These overflows all result in remote code execution under the user of the running Apache process.

tags | advisory, remote, overflow, vulnerability, code execution
SHA-256 | 0161744beee5c0442c15b6bd90c5e6d1e55cbe47940ec1ba4424c2446c68071e

ioactive-modjk2.txt

Change Mirror Download
IOActive Security Advisory

Title: Multiple Buffer Overflows in Legacy mod_jk2 <= 2.0.3-DEV
Severity: High

Date Discovered: 05.01.2007
Date Reported: 06.27.2007
Date Disclosed: 09.20.2007

Affected Products:
mod_jk2 <= v2.0.3-DEV
F5 BIG-IP <= 9.2.3.30 (Other versions were not tested)

Synopsis:
IOActive has discovered a buffer overflow in the Host Header field in
the legacy version of the mod_jk2 Apache module
(jakarta-tomcat-connectors) which allows for remote code execution in
the context of the Apache process.


Description:
mod_jk2 versions prior to 2.0.4 are vulnerable to multiple stack
overflow vulnerabilities. Specifically, IOActive has discovered multiple
locations where these vulnerabilities are exploitable via the Host
request header in any given request. These overflows all result in
remote code execution under the user of the running Apache process.
Although a legacy module which is end of life, certain vendors may use
this module in their products rendering them vulnerable to remote
exploitation.


Technical Details:
Within the mod_jk2 module, the module registers with Apache a request
handler which parses the entire content of the request, specifically the
Host headers, in order to determine which Tomcat worker to forward the
request to. For example, multiple buffer overflow opportunities exist
within the following code segments:


native2\common\jk_uriMap.c: line ~269
if (port) {
if (vhost) {
if (strchr(vhost, ':'))
strcpy(hostname, vhost);
else
sprintf(hostname, "%s:%d", vhost, port);
}
else
sprintf(hostname, "*:%d", port);
}
else if (vhost)
strcpy(hostname, vhost);


native2\common\jk_uriMap.c: line ~842
char key[1024];

if (!vhost && !port)
return uriMap->vhosts->get(env, uriMap->vhosts, "*");
if (!vhost)
vhost = "*";
sprintf(key, "%s:%d", vhost, port);
return uriMap->vhcache->get(env, uriMap->vhcache, key);


In each of these code segments, exploitable stack overflows on the Host
request header are visible. Additionally, in every circumstance, the
condition occurs when a Hostname is provided within the Host: Header
request which is longer than 1024 characters. Exploitation of these
overflows is considered trivial.


Remediation:
Upgrade to the latest version of the legacy mod_jk2 (mod_jk2 2.0.4) or
migrate to the non-legacy reimplementation of this package, the new
jakarta-tomcat-connectors, called mod_jk.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close