The mod_auth_mellon module before 0.8.1 allows remote attackers to cause a denial of service (Apache HTTP server crash) via a crafted logout request that triggers a read of uninitialized data.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://linux.oracle.com/errata/ELSA-2014-1803.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1803.html - Third Party Advisory | |
References | () http://secunia.com/advisories/62094 - Permissions Required, Third Party Advisory | |
References | () http://secunia.com/advisories/62125 - Permissions Required, Third Party Advisory | |
References | () https://github.com/UNINETT/mod_auth_mellon/commit/0f5b4fd860fa7e3a6c47201637aab05395f32647 - Third Party Advisory | |
References | () https://postlister.uninett.no/sympa/arc/modmellon/2014-11/msg00000.html - Vendor Advisory |
Information
Published : 2014-11-14 15:59
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8567
Mitre link : CVE-2014-8567
CVE.ORG link : CVE-2014-8567
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_workstation
uninett
- mod_auth_mellon
CWE
CWE-399
Resource Management Errors