First published: Fri Nov 14 2014(Updated: )
The mod_auth_mellon module before 0.8.1 allows remote attackers to cause a denial of service (Apache HTTP server crash) via a crafted logout request that triggers a read of uninitialized data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mod_Auth_Mellon | <0.8.1 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =6.6 | |
Red Hat Enterprise Linux Server | =6.6 | |
Red Hat Enterprise Linux Server | =6.6 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8567 has a severity rating that indicates it can lead to a denial of service due to a crash of the Apache HTTP server.
To mitigate CVE-2014-8567, upgrade the mod_auth_mellon module to version 0.8.1 or later.
CVE-2014-8567 affects versions of mod_auth_mellon prior to 0.8.1 on various distributions of Red Hat Enterprise Linux.
Yes, CVE-2014-8567 can be exploited remotely via crafted logout requests.
CVE-2014-8567 enables a denial of service attack that can crash the Apache HTTP server.