CVE-2016-2146

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.
Configurations

Configuration 1 (hide)

cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:uninett:mod_auth_mellon:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:47

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179085.html - () http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179085.html -
References () https://github.com/UNINETT/mod_auth_mellon/pull/71 - Patch () https://github.com/UNINETT/mod_auth_mellon/pull/71 - Patch
References () https://sympa.uninett.no/lists/uninett.no/arc/modmellon/2016-03/msg00000.html - () https://sympa.uninett.no/lists/uninett.no/arc/modmellon/2016-03/msg00000.html -

Information

Published : 2016-04-15 14:59

Updated : 2024-11-21 02:47


NVD link : CVE-2016-2146

Mitre link : CVE-2016-2146

CVE.ORG link : CVE-2016-2146


JSON object : View

Products Affected

uninett

  • mod_auth_mellon

fedoraproject

  • fedora
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer