CVE Vulnerabilities

CVE-2025-4476

NULL Pointer Dereference

Published: May 16, 2025 | Modified: May 19, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
4.3 LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM

A denial-of-service vulnerability has been identified in the libsoup HTTP client library. This flaw can be triggered when a libsoup client receives a 401 (Unauthorized) HTTP response containing a specifically crafted domain parameter within the WWW-Authenticate header. Processing this malformed header can lead to a crash of the client application using libsoup. An attacker could exploit this by setting up a malicious HTTP server. If a users application using the vulnerable libsoup library connects to this malicious server, it could result in a denial-of-service. Successful exploitation requires tricking a users client application into connecting to the attackers malicious server.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Libsoup2.4 Ubuntu esm-infra/bionic *
Libsoup2.4 Ubuntu esm-infra/xenial *
Libsoup2.4 Ubuntu focal *
Libsoup2.4 Ubuntu jammy *
Libsoup2.4 Ubuntu noble *
Libsoup2.4 Ubuntu oracular *
Libsoup2.4 Ubuntu plucky *
Libsoup3 Ubuntu esm-apps/jammy *
Libsoup3 Ubuntu jammy *
Libsoup3 Ubuntu noble *
Libsoup3 Ubuntu oracular *
Libsoup3 Ubuntu plucky *

Potential Mitigations

References