CVE Vulnerabilities

CVE-2023-28625

NULL Pointer Dereference

Published: Apr 03, 2023 | Modified: May 31, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when OIDCStripCookies is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using OIDCStripCookies.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Mod_auth_openidc Openidc 2.0.0 (including) 2.4.13.2 (excluding)
Red Hat Enterprise Linux 8 RedHat mod_auth_openidc:2.3-8090020230721123832.b46abd14 *
Red Hat Enterprise Linux 9 RedHat mod_auth_openidc-0:2.4.9.4-4.el9 *
Libapache2-mod-auth-openidc Ubuntu bionic *
Libapache2-mod-auth-openidc Ubuntu kinetic *
Libapache2-mod-auth-openidc Ubuntu lunar *
Libapache2-mod-auth-openidc Ubuntu mantic *
Libapache2-mod-auth-openidc Ubuntu trusty *
Libapache2-mod-auth-openidc Ubuntu xenial *

Potential Mitigations

References