First published: Fri Apr 15 2016(Updated: )
The am_read_post_data function in mod_auth_mellon before 0.11.1 does not check if the ap_get_client_block function returns an error, which allows remote attackers to cause a denial of service (segmentation fault and process crash) via a crafted POST data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =23 | |
Mod_Auth_Mellon | <=0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2145 is classified as a denial of service vulnerability due to potential process crashes from malformed POST data.
To address CVE-2016-2145, upgrade mod_auth_mellon to version 0.11.1 or later.
CVE-2016-2145 affects mod_auth_mellon versions up to and including 0.11.0.
CVE-2016-2145 impacts Fedora 23 and versions of mod_auth_mellon prior to 0.11.1.
Exploiting CVE-2016-2145 allows attackers to cause a denial of service by crafting specific POST data that leads to a segmentation fault.