CVE Vulnerabilities

CVE-2024-38477

NULL Pointer Dereference

Published: Jul 01, 2024 | Modified: Nov 03, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Http_serverApache2.4.0 (including)2.4.60 (excluding)
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-httpd-0:2.4.57-13.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.57-13.el7jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs*
Red Hat Enterprise Linux 7.7 Advanced Update SupportRedHathttpd-0:2.4.6-90.el7_7.4*
Red Hat Enterprise Linux 7 Extended Lifecycle SupportRedHathttpd-0:2.4.6-99.el7_9.2*
Red Hat Enterprise Linux 8RedHathttpd:2.4-8100020240712114234.489197e6*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHathttpd:2.4-8020020240720043142.4cda2c84*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHathttpd:2.4-8040020240720035525.522a0ee4*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHathttpd:2.4-8040020240720035525.522a0ee4*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHathttpd:2.4-8040020240720035525.522a0ee4*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHathttpd:2.4-8060020240719220036.ad008a3a*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHathttpd:2.4-8060020240719220036.ad008a3a*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHathttpd:2.4-8060020240719220036.ad008a3a*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHathttpd:2.4-8080020240717184413.63b34585*
Red Hat Enterprise Linux 9RedHathttpd-0:2.4.57-11.el9_4*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHathttpd-0:2.4.51-7.el9_0.7*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHathttpd-0:2.4.53-11.el9_2.8*
Text-Only JBCSRedHatjbcs-httpd24-httpd*
Apache2Ubuntudevel*
Apache2Ubuntuesm-infra/bionic*
Apache2Ubuntuesm-infra/focal*
Apache2Ubuntuesm-infra/xenial*
Apache2Ubuntufocal*
Apache2Ubuntujammy*
Apache2Ubuntumantic*
Apache2Ubuntunoble*
Apache2Ubuntuoracular*
Apache2Ubuntuplucky*
Apache2Ubuntuquesting*
Apache2Ubuntutrusty/esm*
Apache2Ubuntuupstream*

Potential Mitigations

References