Vulnerability Description
The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | Fedora | 23 |
| Uninett | Mod Auth Mellon | <= 0.11.0 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179085.html
- https://github.com/UNINETT/mod_auth_mellon/pull/71Patch
- https://sympa.uninett.no/lists/uninett.no/arc/modmellon/2016-03/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179085.html
- https://github.com/UNINETT/mod_auth_mellon/pull/71Patch
- https://sympa.uninett.no/lists/uninett.no/arc/modmellon/2016-03/msg00000.html
FAQ
What is CVE-2016-2146?
CVE-2016-2146 is a vulnerability with a CVSS score of 7.5 (HIGH). The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server dea...
How severe is CVE-2016-2146?
CVE-2016-2146 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2146?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject Fedora, Uninett Mod Auth Mellon.