Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-28625
HistoryApr 03, 2023 - 12:00 a.m.

CVE-2023-28625

2023-04-0300:00:00
ubuntu.com
ubuntu.com
8
cve-2023-28625
authentication
authorization
apache
openid connect
relying party
null pointer
segmentation fault
denial-of-service

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

61.3%

mod_auth_openidc is an authentication and authorization module for the
Apache 2.x HTTP server that implements the OpenID Connect Relying Party
functionality. In versions 2.0.0 through 2.4.13.1, when OIDCStripCookies
is set and a crafted cookie supplied, a NULL pointer dereference would
occur, resulting in a segmentation fault. This could be used in a
Denial-of-Service attack and thus presents an availability risk. Version
2.4.13.2 contains a patch for this issue. As a workaround, avoid using
OIDCStripCookies.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

61.3%