Note: This is an archival copy of Security Sun Alert 262468 as previously published on http://sunsolve.sun.com.
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1020661.1.
Article ID : 1020661.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2010-12-05
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Security Vulnerability in the Apache 1.3 "mod_jk" Module may Lead to Unauthorized Access to Data



Category
Security

Release Phase
Resolved

Bug Id
6828821

Product
Solaris 9 Operating System
Solaris 10 Operating System

Date of Resolved Release
25-Jun-2009

Security Vulnerability in the Apache 1.3 "mod_jk" Module ... (see below for details)

1. Impact

Security vulnerability has been found in the Tomcat Connector (mod_jk)
module for Apache HTTP server which affects the Apache 1.3 web server
bundled with Solaris 10 and Solaris 9.

This issue may allow a remote unprivileged user who provides a specially crafted
HTTP requests to bypass access control and gain access to unauthorized data.

Additional information regarding this issue is available at:

CVE-2008-5519 at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519


2. Contributing Factors

This issue can occur in the following releases:

SPARC Platform

  • Solaris 10 with patch 122911-12 or later and without patch 122911-16
  • Solaris 9 with patch 114016-02 or later and without patch 114016-04

x86 Platform

  • Solaris 10 with patch 122912-12 or later and without patch 122912-16
  • Solaris 9 with patch 114017-02 or later and without patch 114017-04

Note 1: A system is only vulnerable to the described issue if the
Apache 1.3 web server has been configured and is running on the system.

The following command can be executed to determine if the Apache 1.3 web
server is currently running on the system:

    $ /usr/bin/ps -ef | grep httpd
nobody 103892 102307 0 Jan 20 ? 0:27 /usr/apache/bin/httpd

Note 2: The vulnerability only affects systems which make use of the
Apache 1.3 module mod_jk.

To determine if the mod_jk module is used, a command such as the
following can be run to search the Apache configuration files for
the use of the Tomcat connector. This should be repeated for all of
the configuration files that define the running Apache 1.3 configuration:

    $ grep mod_jk.so /etc/apache/tomcat.conf
LoadModule jk_module libexec/mod_jk.so

Note 3: Solaris 8 does not include the "mod_jk" module and so it is not impacted by this issue.

Note 4: OpenSolaris never included version of Apache 1.3 module "mod_jk"
which is vulnerable to this issue and thus it is not impacted.


3. Symptoms

There are no predictable symptoms that would indicate that this issue has been exploited.


4. Relief/Workaround

There is no workaround for this issue.



5. Resolution

This issue is resolved in the following releases:

SPARC Platform

  • Solaris 10 with patch 122911-16 or later
  • Solaris 9 with patch 114016-04 or later

x86 Platform

  • Solaris 10 with patch 122912-16 or later
  • Solaris 9 with patch 114017-04 or later

For more information on Security Sun Alerts, see


References

122911-16
122912-16
114016-04
114017-04




References

SUNPATCH:114016-04
SUNPATCH:114017-04
SUNPATCH:122911-16
SUNPATCH:122912-16



Attachments
This solution has no attachment