First published: Sat Nov 15 2014(Updated: )
The mod_auth_mellon module before 0.8.1 allows remote attackers to obtain sensitive information or cause a denial of service (segmentation fault) via unspecified vectors related to a "session overflow" involving "sessions overlapping in memory."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mod_Auth_Mellon | <=0.8.0 | |
Oracle Linux | =6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8566 has a severity rating that indicates the potential for significant impact, including information disclosure or denial of service.
To fix CVE-2014-8566, update the mod_auth_mellon module to version 0.8.1 or later.
CVE-2014-8566 affects versions of the mod_auth_mellon module prior to 0.8.1 and Oracle Linux 6.
CVE-2014-8566 is associated with memory management vulnerabilities that can lead to session overflow and segmentation faults.
Yes, CVE-2014-8566 allows remote attackers to potentially obtain sensitive information or cause a denial of service.