Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-2146

Опубликовано: 15 апр. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

РелизСтатусПримечание
artful

not-affected

0.12.0-1
bionic

not-affected

0.12.0-1
cosmic

not-affected

0.12.0-1
devel

not-affected

0.12.0-1
disco

not-affected

0.12.0-1
esm-apps/xenial

not-affected

0.12.0-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
esm-infra/bionic

not-affected

0.12.0-1
precise

DNE

precise/esm

DNE

Показывать по

EPSS

Процентиль: 70%
0.00649
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

redhat
почти 10 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

CVSS3: 7.5
nvd
почти 10 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

CVSS3: 7.5
debian
почти 10 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does n ...

CVSS3: 7.5
github
больше 3 лет назад

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

EPSS

Процентиль: 70%
0.00649
Низкий

5 Medium

CVSS2

7.5 High

CVSS3