Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Host header.
                
            References
                    | Link | Resource | 
|---|---|
| http://securityreason.com/securityalert/3661 | Broken Link | 
| http://www.ioactive.com/pdfs/mod_jk2.pdf | Third Party Advisory | 
| http://www.ioactive.com/vulnerabilities/mod_jk2LegacyBufferOverflowAdvisory.pdf | Broken Link | 
| http://www.kb.cert.org/vuls/id/771937 | Patch Third Party Advisory US Government Resource | 
| http://www.securityfocus.com/archive/1/487983/100/100/threaded | Third Party Advisory VDB Entry | 
| http://www.securityfocus.com/bid/27752 | Patch Third Party Advisory VDB Entry | 
| http://www.vupen.com/english/advisories/2008/0572 | URL Repurposed | 
| https://www.exploit-db.com/exploits/5330 | Third Party Advisory VDB Entry | 
| https://www.exploit-db.com/exploits/5386 | Third Party Advisory VDB Entry | 
Configurations
                    History
                    No history.
Information
                Published : 2008-02-19 00:00
Updated : 2022-02-03 19:43
NVD link : CVE-2007-6258
Mitre link : CVE-2007-6258
CVE.ORG link : CVE-2007-6258
JSON object : View
Products Affected
                apache
- mod_jk
f5
- big-ip
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
