CVE Vulnerabilities

CVE-2023-28625

NULL Pointer Dereference

Published: Apr 03, 2023 | Modified: Apr 10, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when OIDCStripCookies is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using OIDCStripCookies.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Mod_auth_openidcOpenidc2.0.0 (including)2.4.13.2 (excluding)
Red Hat Enterprise Linux 8RedHatmod_auth_openidc:2.3-8090020230721123832.b46abd14*
Red Hat Enterprise Linux 9RedHatmod_auth_openidc-0:2.4.9.4-4.el9*
Libapache2-mod-auth-openidcUbuntubionic*
Libapache2-mod-auth-openidcUbuntuesm-apps/bionic*
Libapache2-mod-auth-openidcUbuntuesm-apps/focal*
Libapache2-mod-auth-openidcUbuntuesm-apps/jammy*
Libapache2-mod-auth-openidcUbuntufocal*
Libapache2-mod-auth-openidcUbuntujammy*
Libapache2-mod-auth-openidcUbuntukinetic*
Libapache2-mod-auth-openidcUbuntulunar*
Libapache2-mod-auth-openidcUbuntumantic*
Libapache2-mod-auth-openidcUbuntutrusty*
Libapache2-mod-auth-openidcUbuntuupstream*
Libapache2-mod-auth-openidcUbuntuxenial*

Potential Mitigations

References