7.5
CWE
476
Advisory Published
Updated

CVE-2023-28625: Null Pointer Dereference

First published: Mon Apr 03 2023(Updated: )

mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Openidc Mod Auth Openidc>=2.0.0<2.4.13.2
debian/libapache2-mod-auth-openidc<=2.3.10.2-1+deb10u1
2.3.10.2-1+deb10u3
2.4.9.4-0+deb11u3
2.4.12.3-2
2.4.14.2-1
debian/libapache2-mod-auth-openidc<=2.3.10.2-1+deb10u1<=2.4.9.4-0+deb11u2<=2.4.12.3-1
2.3.10.2-1+deb10u2
2.4.12.3-2
2.4.9.4-0+deb11u3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-28625?

    CVE-2023-28625 is a vulnerability in mod_auth_openidc, an authentication and authorization module for the Apache 2.x HTTP server.

  • What is mod_auth_openidc?

    mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality.

  • What is the severity of CVE-2023-28625?

    The severity of CVE-2023-28625 is high, with a CVSS score of 7.5.

  • How does CVE-2023-28625 affect mod_auth_openidc?

    CVE-2023-28625 affects mod_auth_openidc versions 2.0.0 through 2.4.13.1.

  • How can CVE-2023-28625 be fixed?

    The vulnerability can be fixed by upgrading mod_auth_openidc to version 2.4.13.2 or later.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203