While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Http_server | Apache | 2.4.49 (including) | 2.4.49 (including) |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-httpd-0:2.4.51-28.el8jbcs | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-httpd-0:2.4.51-28.el7jbcs | * |
Red Hat JBoss Core Services 1 | RedHat | jbcs-httpd24-httpd | * |
Apache2 | Ubuntu | upstream | * |