The am_read_post_data function in mod_auth_mellon before 0.11.1 does not check if the ap_get_client_block function returns an error, which allows remote attackers to cause a denial of service (segmentation fault and process crash) via a crafted POST data.
References
Configurations
History
21 Nov 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179085.html - | |
References | () https://github.com/UNINETT/mod_auth_mellon/pull/71 - Patch | |
References | () https://sympa.uninett.no/lists/uninett.no/arc/modmellon/2016-03/msg00000.html - |
Information
Published : 2016-04-15 14:59
Updated : 2024-11-21 02:47
NVD link : CVE-2016-2145
Mitre link : CVE-2016-2145
CVE.ORG link : CVE-2016-2145
JSON object : View
Products Affected
uninett
- mod_auth_mellon
fedoraproject
- fedora
CWE
CWE-20
Improper Input Validation