CVE-2016-6808

Published on: 04/12/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:12 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Tomcat Jk Connector from Apache contain the following vulnerability:

Buffer overflow in Apache Tomcat Connectors (mod_jk) before 1.2.42.

  • CVE-2016-6808 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [tomcat-dev] 20190415 svn commit: r1857582 [20/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
Pony Mail! Mailing List
Vendor Advisory
lists.apache.org
text/html
URL Logo MLIST [tomcat-dev] 20190325 svn commit: r1856174 [25/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
Red Hat Customer Portal Third Party Advisory
access.redhat.com
text/html
URL Logo REDHAT RHSA-2017:0194
oss-security - [SECURITY] CVE-2016-6808 Apache Tomcat JK ISAPI Connector buffer overflow Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20161006 [SECURITY] CVE-2016-6808 Apache Tomcat JK ISAPI Connector buffer overflow
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [tomcat-dev] 20200213 svn commit: r1873980 [30/34] - /tomcat/site/trunk/docs/
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [tomcat-dev] 20190413 svn commit: r1857494 [18/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
Apache Tomcat® - Apache Tomcat JK Connectors vulnerabilities Vendor Advisory
tomcat.apache.org
text/html
URL Logo CONFIRM tomcat.apache.org/security-jk.html
Apache Mail Archives Mailing List
Vendor Advisory
lists.apache.org
text/html
URL Logo MLIST [tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
Red Hat Customer Portal Third Party Advisory
access.redhat.com
text/html
URL Logo REDHAT RHSA-2017:0193
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/
Apache Tomcat JK ISAPI Connector 1.2.41 Buffer Overflow ≈ Packet Storm Exploit
Mitigation
Third Party Advisory
VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/139071/Apache-Tomcat-JK-ISAPI-Connector-1.2.41-Buffer-Overflow.html
Full Disclosure: [SECURITY] CVE-2016-6808 Apache Tomcat JK ISAPI Connector buffer overflow Mailing List
Third Party Advisory
seclists.org
text/html
URL Logo FULLDISC 20161011 [SECURITY] CVE-2016-6808 Apache Tomcat JK ISAPI Connector buffer overflow
Apache Tomcat JK Connector CVE-2016-6808 Remote Buffer Overflow Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 93429
Apache Tomcat JK ISAPI Connector Buffer Overflow May Let Remote Users Execute Arbitrary Code - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1036969
Red Hat Customer Portal Third Party Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2957

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationApacheTomcat Jk ConnectorAllAllAllAll
ApplicationApacheTomcat Jk ConnectorAllAllAllAll
  • cpe:2.3:a:apache:tomcat_jk_connector:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:tomcat_jk_connector:*:*:*:*:*:*:*:*: