Unchecked Error Condition Affecting mod_auth_mellon package, versions *


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.94% (84th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS6-MODAUTHMELLON-1962081
  • published26 Jul 2021
  • disclosed9 Mar 2016

Introduced: 9 Mar 2016

CVE-2016-2145  (opens in a new tab)
CWE-391  (opens in a new tab)

How to fix?

There is no fixed version for Centos:6 mod_auth_mellon.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mod_auth_mellon package and not the mod_auth_mellon package as distributed by Centos. See How to fix? for Centos:6 relevant fixed versions and status.

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not check if the ap_get_client_block function returns an error, which allows remote attackers to cause a denial of service (segmentation fault and process crash) via a crafted POST data.

CVSS Scores

version 3.1