April 3, 2023, 2:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.

apache attack authentication authorization availability connect cookie cve http openid openid connect party patch risk segmentation server service version workaround

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

IT Security Engineer

@ People Profilers | Singapore, Singapore, Singapore

Consultant - DFIR - EMEA (SA)

@ Control Risks | Johannesburg, Gauteng, South Africa

Consultant Sénior Cyber Sécurité H/F

@ Hifield | Lyon, France