CVE Vulnerabilities

CVE-2021-44224

NULL Pointer Dereference

Published: Dec 20, 2021 | Modified: Nov 21, 2024
CVSS 3.x
8.2
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
7.1 MODERATE
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Http_serverApache2.4.7 (including)2.4.52 (excluding)
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-httpd-0:2.4.51-28.el8jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.51-28.el7jbcs*
Red Hat Enterprise Linux 8RedHathttpd:2.4-8060020220321163517.d63f516d*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHathttpd24-httpd-0:2.4.34-23.el7.5*
Text-Only JBCSRedHatjbcs-httpd24-httpd*
Apache2Ubuntubionic*
Apache2Ubuntudevel*
Apache2Ubuntuesm-infra-legacy/trusty*
Apache2Ubuntuesm-infra/bionic*
Apache2Ubuntuesm-infra/focal*
Apache2Ubuntuesm-infra/xenial*
Apache2Ubuntufocal*
Apache2Ubuntuhirsute*
Apache2Ubuntuimpish*
Apache2Ubuntujammy*
Apache2Ubuntutrusty/esm*
Apache2Ubuntuupstream*

Potential Mitigations

References