First published: Mon Feb 18 2008(Updated: )
Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Host header.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache mod_jk | =2.0 | |
Apache mod_jk | =2.0.1 | |
Apache mod_jk | =2.0.2 | |
Apache mod_jk | =2.0.3_dev | |
F5 BIG-IP and BIG-IQ Centralized Management | =9.2.3.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6258 is considered to have a high severity rating due to the potential for remote code execution.
To fix CVE-2007-6258, upgrade mod_jk to version 2.0.4 or later.
CVE-2007-6258 affects Apache mod_jk versions 2.0.3-DEV and earlier, as well as specific versions of F5 BIG-IP.
The risks associated with CVE-2007-6258 include execution of arbitrary code and potential system compromise.
Yes, CVE-2007-6258 can be exploited remotely through crafted HTTP Host headers.