Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2146

Опубликовано: 15 апр. 2016
Источник: debian
EPSS Низкий

Описание

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libapache2-mod-auth-mellonfixed0.12.0-1package
libapache2-mod-auth-mellonno-dsajessiepackage

EPSS

Процентиль: 70%
0.00649
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 10 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

redhat
почти 10 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

CVSS3: 7.5
nvd
почти 10 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

CVSS3: 7.5
github
больше 3 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

EPSS

Процентиль: 70%
0.00649
Низкий