RULE(RULE ID:332318)

Rule General Information
Release Date: 2021-01-21
Rule Name: Apache Tomcat JK Web Server Connector Long URL Stack Overflow Vulnerability (CVE-2007-0774)
Severity:
CVE ID:
Rule Protection Details
Description: There exists a stack overflow vulnerability in Apache Tomcat JK Web Server Connector. The vulnerability is due to a boundary error in URL handler of the affected module. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to the target host. Successful exploitation would allow the attacker to execute arbitrary code on the vulnerable system with privileges of the running process, normally System. In a sophisticated attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service, which is normally the System. In an attack case where code injection is not successful, the affected server will terminate and all established connections will also be terminated.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, Others
Reference: SecurityFocusBID:22791
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
SecurityTrackerID:1017719
http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://www.apache.org/dist/tomcat/tomcat-connectors/jk/source/jk-1.2.21/tomcat-connectors-1.2.21-src.tar.gz