The mod_auth_mellon module before 0.8.1 allows remote attackers to obtain sensitive information or cause a denial of service (segmentation fault) via unspecified vectors related to a "session overflow" involving "sessions overlapping in memory."
References
Configurations
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://linux.oracle.com/errata/ELSA-2014-1803.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1803.html - | |
References | () http://secunia.com/advisories/62094 - | |
References | () http://secunia.com/advisories/62125 - | |
References | () https://github.com/UNINETT/mod_auth_mellon/releases/tag/v0.8.1 - Patch, Vendor Advisory | |
References | () https://postlister.uninett.no/sympa/arc/modmellon/2014-11/msg00000.html - Patch, Vendor Advisory |
Information
Published : 2014-11-15 21:59
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8566
Mitre link : CVE-2014-8566
CVE.ORG link : CVE-2014-8566
JSON object : View
Products Affected
oracle
- linux
uninett
- mod_auth_mellon
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor