The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.
References
Configurations
History
21 Nov 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179085.html - | |
References | () https://github.com/UNINETT/mod_auth_mellon/pull/71 - Patch | |
References | () https://sympa.uninett.no/lists/uninett.no/arc/modmellon/2016-03/msg00000.html - |
Information
Published : 2016-04-15 14:59
Updated : 2024-11-21 02:47
NVD link : CVE-2016-2146
Mitre link : CVE-2016-2146
CVE.ORG link : CVE-2016-2146
JSON object : View
Products Affected
uninett
- mod_auth_mellon
fedoraproject
- fedora
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer