CVE-2016-3110

Published on: 09/26/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:02 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Fedora from Fedoraproject contain the following vulnerability:

mod_cluster, as used in Red Hat JBoss Web Server 2.1, allows remote attackers to cause a denial of service (Apache http server crash) via an MCMP message containing a series of = (equals) characters after a legitimate element.

  • CVE-2016-3110 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
[SECURITY] Fedora 30 Update: mod_cluster-1.3.11-1.fc30 - package-announce - Fedora Mailing-Lists Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2019-7813edd5a2
Red Hat Customer Portal Vendor Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:1648
Red Hat mod_cluster CVE-2016-3110 Local Denial of Service Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 92584
No Description Provided Broken Link
rhn.redhat.com

Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2056
[SECURITY] Fedora 29 Update: mod_cluster-1.3.11-1.fc29 - package-announce - Fedora Mailing-Lists Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2019-17556e2ad6
Red Hat Customer Portal Broken Link
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:1650
Red Hat Customer Portal Vendor Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2054
[SECURITY] Fedora 28 Update: mod_cluster-1.3.11-1.fc28 - package-announce - Fedora Mailing-Lists Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2019-3877efca99
Bug 1326320 – CVE-2016-3110 mod_cluster: remotely Segfault Apache http server Issue Tracking
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1326320
Red Hat Customer Portal Vendor Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2055
Red Hat Customer Portal Vendor Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:1649

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
FedoraprojectFedora28AllAllAll
Operating
System
FedoraprojectFedora29AllAllAll
Operating
System
FedoraprojectFedora30AllAllAll
Operating
System
FedoraprojectFedora28AllAllAll
Operating
System
FedoraprojectFedora29AllAllAll
Operating
System
FedoraprojectFedora30AllAllAll
Operating
System
RedhatEnterprise Linux6.0AllAllAll
Operating
System
RedhatEnterprise Linux7.0AllAllAll
Operating
System
RedhatEnterprise Linux6.0AllAllAll
Operating
System
RedhatEnterprise Linux7.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform6.0.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform6.4.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform6.0.0AllAllAll
ApplicationRedhatJboss Enterprise Application Platform6.4.0AllAllAll
ApplicationRedhatJboss Enterprise Web Server2.0.0AllAllAll
ApplicationRedhatJboss Enterprise Web Server2.1AllAllAll
ApplicationRedhatJboss Enterprise Web Server2.0.0AllAllAll
ApplicationRedhatJboss Enterprise Web Server2.1AllAllAll
  • cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_web_server:2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:jboss_enterprise_web_server:2.1:*:*:*:*:*:*:*: