mod_auth_mellon provides a SAML 2.0 authentication module for the Apache HTTP Server. An information disclosure flaw was found in mod_auth_mellon’s session handling that could lead to sessions overlapping in memory. A remote attacker could potentially use this flaw to obtain data from another user’s session. (CVE-2014-8566) It was found that uninitialized data could be read when processing a user’s logout request. By attempting to log out, a user could possibly cause the Apache HTTP Server to crash. (CVE-2014-8567) Red Hat would like to thank the mod_auth_mellon team for reporting these issues. Upstream acknowledges Matthew Slowe as the original reporter of CVE-2014-8566. All users of mod_auth_mellon are advised to upgrade to this updated package, which contains a backported patch to correct these issues.
CPE | Name | Operator | Version |
---|---|---|---|
mod_auth_mellon | eq | 0.8.0__2.el6 |
linux.oracle.com/errata/ELSA-2014-1803.html
rhn.redhat.com/errata/RHSA-2014-1803.html
secunia.com/advisories/62094
secunia.com/advisories/62125
access.redhat.com/security/updates/classification/#important
github.com/UNINETT/mod_auth_mellon/commit/0f5b4fd860fa7e3a6c47201637aab05395f32647
postlister.uninett.no/sympa/arc/modmellon/2014-11/msg00000.html
rhn.redhat.com/errata/RHSA-2014-1803.html