Описание
The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 0.12.0-1 |
| bionic | not-affected | 0.12.0-1 |
| cosmic | not-affected | 0.12.0-1 |
| devel | not-affected | 0.12.0-1 |
| disco | not-affected | 0.12.0-1 |
| esm-apps/xenial | not-affected | 0.12.0-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| esm-infra/bionic | not-affected | 0.12.0-1 |
| precise | DNE | |
| precise/esm | DNE |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.
The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.
The am_read_post_data function in mod_auth_mellon before 0.11.1 does n ...
The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3