Executive Summary

Summary
Titlelibapache-mod-jk security update
Informations
NameDSA-4357First vendor Publication2018-12-20
VendorDebianLast vendor Modification2018-12-20
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base ScoreN/AAttack RangeN/A
Cvss Impact ScoreN/AAttack ComplexityN/A
Cvss Expoit ScoreN/AAuthenticationN/A
Calculate full CVSS 2.0 Vectors scores

Detail

Raphael Arrouas and Jean Lejeune discovered an access control bypass vulnerability in mod_jk, the Apache connector for the Tomcat Java servlet engine. The vulnerability is addressed by upgrading mod_jk to the new upstream version 1.2.46, which includes additional changes.

https://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html#Changes_between_1.2.42_and_1.2.43 https://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html#Changes_between_1.2.43_and_1.2.44 https://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html#Changes_between_1.2.44_and_1.2.45 https://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html#Changes_between_1.2.45_and_1.2.46

For the stable distribution (stretch), this problem has been fixed in version 1:1.2.46-0+deb9u1.

We recommend that you upgrade your libapache-mod-jk packages.

For the detailed security status of libapache-mod-jk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libapache-mod-jk

Original Source

Url : http://www.debian.org/security/2018/dsa-4357

Snort® IPS/IDS

DateDescription
2018-12-14Apache Tomcat mod_jk access control bypass attempt
RuleID : 48384 - Revision : 1 - Type : SERVER-APACHE
2018-12-14Apache Tomcat mod_jk access control bypass attempt
RuleID : 48383 - Revision : 1 - Type : SERVER-APACHE
2018-12-14Apache Tomcat mod_jk access control bypass attempt
RuleID : 48382 - Revision : 1 - Type : SERVER-APACHE
2018-12-14Apache Tomcat mod_jk access control bypass attempt
RuleID : 48381 - Revision : 1 - Type : SERVER-APACHE

Nessus® Vulnerability Scanner

DateDescription
2018-12-24Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4357.nasl - Type : ACT_GATHER_INFO
2018-12-18Name : The remote Debian host is missing a security update.
File : debian_DLA-1609.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2018-12-21 00:18:33
  • First insertion