The mod_auth_mellon module before 0.8.1 allows remote attackers to obtain sensitive information or cause a denial of service (segmentation fault) via unspecified vectors related to a "session overflow" involving "sessions overlapping in memory."
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://linux.oracle.com/errata/ELSA-2014-1803.html | |
http://rhn.redhat.com/errata/RHSA-2014-1803.html | vendor advisory |
https://github.com/UNINETT/mod_auth_mellon/releases/tag/v0.8.1 | patch vendor advisory |
http://secunia.com/advisories/62094 | third party advisory |
http://secunia.com/advisories/62125 | third party advisory |
https://postlister.uninett.no/sympa/arc/modmellon/2014-11/msg00000.html | mailing list patch vendor advisory |