Lucene search

K
centosCentOS ProjectCESA-2014:1803
HistoryNov 05, 2014 - 12:06 p.m.

mod_auth_mellon security update

2014-11-0512:06:15
CentOS Project
lists.centos.org
44

9.4 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:C/A:C

0.023 Low

EPSS

Percentile

89.8%

CentOS Errata and Security Advisory CESA-2014:1803

mod_auth_mellon provides a SAML 2.0 authentication module for the Apache
HTTP Server.

An information disclosure flaw was found in mod_auth_mellon’s session
handling that could lead to sessions overlapping in memory. A remote
attacker could potentially use this flaw to obtain data from another user’s
session. (CVE-2014-8566)

It was found that uninitialized data could be read when processing a user’s
logout request. By attempting to log out, a user could possibly cause the
Apache HTTP Server to crash. (CVE-2014-8567)

Red Hat would like to thank the mod_auth_mellon team for reporting these
issues. Upstream acknowledges Matthew Slowe as the original reporter of
CVE-2014-8566.

All users of mod_auth_mellon are advised to upgrade to this updated
package, which contains a backported patch to correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2014-November/082899.html

Affected packages:
mod_auth_mellon

Upstream details at:
https://access.redhat.com/errata/RHSA-2014:1803

9.4 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:C/A:C

0.023 Low

EPSS

Percentile

89.8%