7.5
CVSSv2

CVE-2016-6808

Published: 12/04/2017 Updated: 15/04/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 735
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Apache Tomcat Connectors (mod_jk) prior to 1.2.42.

Affected Products

Vendor Product Versions
ApacheTomcat Jk Connector1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.32, 1.2.33, 1.2.35, 1.2.36, 1.2.37, 1.2.39, 1.2.40, 1.2.41

Vendor Advisories

Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2423 Release on RHEL 6 Type/Severity Security Advisory: Important Topic Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2423 and fix several bugs, and add various enhancements are now available for Red Hat En ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2423 Release on RHEL 7 Type/Severity Security Advisory: Important Topic An update is now available for JBoss Core Services on RHEL 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerab ...
It was found that the length checks prior to writing to the target buffer for creating a virtual host mapping rule did not take account of the length of the virtual host name, creating the potential for a buffer overflow ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP 2423 Release Type/Severity Security Advisory: Important Topic Red Hat JBoss Core Services httpd 2423 is now available from the Red Hat Customer Portal for Solaris and Microsoft Windows systemsRed Hat Product Security has rated this release as ...