CVE-2016-2145 — Improper Input Validation in MOD Auth Mellon
Severity
7.5HIGHNVD
EPSS
0.8%
top 25.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 15
Latest updateMay 17
Description
The am_read_post_data function in mod_auth_mellon before 0.11.1 does not check if the ap_get_client_block function returns an error, which allows remote attackers to cause a denial of service (segmentation fault and process crash) via a crafted POST data.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Patches
🔴Vulnerability Details
3📋Vendor Advisories
2💬Community
3Bugzilla▶
CVE-2016-2145 mod_auth_mellon: Missing error check when calling ap_get_client_block() [fedora-all]↗2016-03-09
Bugzilla
▶
Bugzilla
▶