First published: Fri Apr 15 2016(Updated: )
The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =23 | |
Mod_Auth_Mellon | <=0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2146 has a severity level of medium due to the potential for denial of service attacks.
To fix CVE-2016-2146, update mod_auth_mellon to version 0.11.1 or later.
CVE-2016-2146 affects all versions of mod_auth_mellon up to and including 0.11.0.
CVE-2016-2146 is categorized as a denial of service vulnerability.
CVE-2016-2146 is caused by the am_read_post_data function not limiting the amount of data read.