Family: Denial of Service --> Category: infos
mod_jk chunked encoding DoS Vulnerability Scan
Vulnerability Scan Summary
Checks for version of mod_jk
Detailed Explanation for this Vulnerability Test
The remote host is using the Apache mod_jk module which
is older than version 1.2.1
There is a bug in these versions which may allow an
attacker to use chunked encoding requests to desynchronize
Apache and Tomcat, and therefore prevent the remote web site
from working properly.
*** As Nessus solely relied on the banner of the remote
*** host to issue this alert, this might be a false positive
Solution : Upgrade to mod_jk 1.2.1 or newer
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.