|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for mod_auth_mellon RHSA-2014:1803-01|
|Summary:||The remote host is missing an update for the 'mod_auth_mellon'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'mod_auth_mellon'
package(s) announced via the referenced advisory.
mod_auth_mellon provides a SAML 2.0 authentication module for the Apache
An information disclosure flaw was found in mod_auth_mellon's session
handling that could lead to sessions overlapping in memory. A remote
attacker could potentially use this flaw to obtain data from another user's
It was found that uninitialized data could be read when processing a user's
logout request. By attempting to log out, a user could possibly cause the
Apache HTTP Server to crash. (CVE-2014-8567)
Red Hat would like to thank the mod_auth_mellon team for reporting these
issues. Upstream acknowledges Matthew Slowe as the original reporter of
All users of mod_auth_mellon are advised to upgrade to this updated
package, which contains a backported patch to correct these issues.
mod_auth_mellon on Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2014-8566|
RedHat Security Advisories: RHSA-2014:1803
Common Vulnerability Exposure (CVE) ID: CVE-2014-8567
|Copyright||Copyright (C) 2014 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.