The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

Subscriptions

Vendors Products
Fedoraproject Subscribe
Uninett Subscribe
Mod Auth Mellon Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2016-3247 The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00649}

epss

{'score': 0.0119}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T23:17:50.703Z

Reserved: 2016-01-29T00:00:00.000Z

Link: CVE-2016-2146

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-04-15T14:59:12.083

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-2146

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-03-09T00:00:00Z

Links: CVE-2016-2146 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses