Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2146

Опубликовано: 09 мар. 2016
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6mod_auth_mellonWill not fix
Red Hat Enterprise Linux 7mod_auth_mellonWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1315747mod_auth_mellon: Failure to limit amount of POST data submitted by client

EPSS

Процентиль: 70%
0.00649
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 10 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

CVSS3: 7.5
nvd
почти 10 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

CVSS3: 7.5
debian
почти 10 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does n ...

CVSS3: 7.5
github
больше 3 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

EPSS

Процентиль: 70%
0.00649
Низкий

4.3 Medium

CVSS2