5
CVSSv2

CVE-2016-3110

Published: 26/09/2016 Updated: 13/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

mod_cluster, as used in Red Hat JBoss Web Server 2.1, allows remote malicious users to cause a denial of service (Apache http server crash) via an MCMP message containing a series of = (equals) characters after a legitimate element.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat jboss_enterprise_application_platform 6.0.0

redhat jboss_enterprise_application_platform 6.4.0

redhat jboss_enterprise_web_server 2.0.0

redhat jboss_enterprise_web_server 2.1

fedoraproject fedora 28

fedoraproject fedora 29

fedoraproject fedora 30

Vendor Advisories

Synopsis Moderate: Red Hat JBoss Enterprise Application Platform 6410 natives update on RHEL 7 Type/Severity Security Advisory: Moderate Topic Updated packages that provide Red Hat JBoss Enterprise Application Platform 6410 natives, fix several bugs, and add various enhancements are now available for Re ...
Synopsis Moderate: Red Hat JBoss Enterprise Application Platform 6410 natives update on RHEL 6 Type/Severity Security Advisory: Moderate Topic Updated packages that provide Red Hat JBoss Enterprise Application Platform 6410 natives, fix several bugs, and add various enhancements are now available for Re ...
It was discovered that it is possible to remotely Segfault Apache http server with a specially crafted string sent to the mod_cluster via service messages (MCMP) ...