Out-of-Bounds The advisory has been revoked - it doesn't affect any version of package libapache2-mod-auth-mellon  (opens in a new tab)


Threat Intelligence

EPSS
0.71% (81st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1904-LIBAPACHE2MODAUTHMELLON-622238
  • published15 Apr 2016
  • disclosed15 Apr 2016

Introduced: 15 Apr 2016

CVE-2016-2146  (opens in a new tab)
CWE-119  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:19.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libapache2-mod-auth-mellon package and not the libapache2-mod-auth-mellon package as distributed by Ubuntu.

The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.