The mod_auth_mellon module before 0.8.1 allows remote attackers to cause a denial of service (Apache HTTP server crash) via a crafted logout request that triggers a read of uninitialized data.
References
Link | Resource |
---|---|
http://secunia.com/advisories/62094 | Permissions Required Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2014-1803.html | Third Party Advisory |
https://github.com/UNINETT/mod_auth_mellon/commit/0f5b4fd860fa7e3a6c47201637aab05395f32647 | Third Party Advisory |
https://postlister.uninett.no/sympa/arc/modmellon/2014-11/msg00000.html | Vendor Advisory |
http://secunia.com/advisories/62125 | Permissions Required Third Party Advisory |
http://linux.oracle.com/errata/ELSA-2014-1803.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2014-11-14 07:59
Updated : 2019-07-09 05:29
NVD link : CVE-2014-8567
Mitre link : CVE-2014-8567
JSON object : View
CWE
CWE-399
Resource Management Errors
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_tus
- enterprise_linux_server_eus
- enterprise_linux_server
uninett
- mod_auth_mellon