CVE Vulnerabilities

CVE-2025-4476

NULL Pointer Dereference

Published: May 16, 2025 | Modified: May 19, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
4.3 LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A denial-of-service vulnerability has been identified in the libsoup HTTP client library. This flaw can be triggered when a libsoup client receives a 401 (Unauthorized) HTTP response containing a specifically crafted domain parameter within the WWW-Authenticate header. Processing this malformed header can lead to a crash of the client application using libsoup. An attacker could exploit this by setting up a malicious HTTP server. If a users application using the vulnerable libsoup library connects to this malicious server, it could result in a denial-of-service. Successful exploitation requires tricking a users client application into connecting to the attackers malicious server.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Libsoup2.4Ubuntuesm-infra/bionic*
Libsoup2.4Ubuntuesm-infra/focal*
Libsoup2.4Ubuntuesm-infra/xenial*
Libsoup2.4Ubuntufocal*
Libsoup2.4Ubuntujammy*
Libsoup2.4Ubuntunoble*
Libsoup2.4Ubuntuoracular*
Libsoup2.4Ubuntuplucky*
Libsoup3Ubuntuesm-apps/jammy*
Libsoup3Ubuntujammy*
Libsoup3Ubuntunoble*
Libsoup3Ubuntuoracular*
Libsoup3Ubuntuplucky*

Potential Mitigations

References