Author: markt
Date: Thu Oct  6 10:42:13 2016
New Revision: 1763552

URL: http://svn.apache.org/viewvc?rev=1763552&view=rev
Log:
Add CVE-2016-6808

Modified:
    tomcat/site/trunk/docs/security-jk.html
    tomcat/site/trunk/xdocs/security-jk.xml

Modified: tomcat/site/trunk/docs/security-jk.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-jk.html?rev=1763552&r1=1763551&r2=1763552&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-jk.html (original)
+++ tomcat/site/trunk/docs/security-jk.html Thu Oct  6 10:42:13 2016
@@ -219,6 +219,9 @@
 <a href="#Apache_Tomcat_JK_Connectors_vulnerabilities">Apache Tomcat JK 
Connectors vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_JK_Connector_1.2.42">Fixed in Apache Tomcat 
JK Connector 1.2.42</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_JK_Connector_1.2.41">Fixed in Apache Tomcat 
JK Connector 1.2.41</a>
 </li>
 <li>
@@ -255,6 +258,33 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_JK_Connector_1.2.42">Fixed in Apache Tomcat JK 
Connector 1.2.42</h3>
+<div class="text">
+
+    
+<p>
+<strong>Moderate: Buffer Overflow</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6808"; 
rel="nofollow">CVE-2016-6808</a>
+</p>
+
+    
+<p>The IIS/ISAPI specific code implements special handling when a virtual
+       host is present. The virtual host name and the URI are concatenated to
+       create a virtual host mapping rule. The length checks prior to writing
+       to the target buffer for this rule did not take account of the length of
+       the virtual host name, creating the potential for a buffer overflow.</p>
+
+    
+<p>It is not known if this overflow is exploitable.</p>
+
+    
+<p>This was fixed in <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1762057";>revision 
1762057</a>.</p>
+
+    
+<p>Affects: JK 1.2.0-1.2.41</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_JK_Connector_1.2.41">Fixed in Apache Tomcat JK 
Connector 1.2.41</h3>
 <div class="text">
 

Modified: tomcat/site/trunk/xdocs/security-jk.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-jk.xml?rev=1763552&r1=1763551&r2=1763552&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-jk.xml (original)
+++ tomcat/site/trunk/xdocs/security-jk.xml Thu Oct  6 10:42:13 2016
@@ -28,6 +28,25 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat JK Connector 1.2.42">
+
+    <p><strong>Moderate: Buffer Overflow</strong>
+       <cve>CVE-2016-6808</cve></p>
+
+    <p>The IIS/ISAPI specific code implements special handling when a virtual
+       host is present. The virtual host name and the URI are concatenated to
+       create a virtual host mapping rule. The length checks prior to writing
+       to the target buffer for this rule did not take account of the length of
+       the virtual host name, creating the potential for a buffer overflow.</p>
+
+    <p>It is not known if this overflow is exploitable.</p>
+
+    <p>This was fixed in <revlink rev="1762057">revision 1762057</revlink>.</p>
+
+    <p>Affects: JK 1.2.0-1.2.41</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat JK Connector 1.2.41">
 
     <p><strong>Important: Information disclosure</strong>



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to