| { |
| "containers": { |
| "cna": { |
| "affected": [ |
| { |
| "defaultStatus": "unaffected", |
| "product": "Apache HTTP Server", |
| "vendor": "Apache Software Foundation", |
| "versions": [ |
| { |
| "lessThanOrEqual": "2.4.66", |
| "status": "affected", |
| "version": "2.4.0", |
| "versionType": "semver" |
| } |
| ] |
| } |
| ], |
| "credits": [ |
| { |
| "lang": "en", |
| "type": "finder", |
| "value": "Pavel Kohout, Aisle Research, Aisle.com" |
| }, |
| { |
| "lang": "en", |
| "type": "finder", |
| "value": "Arkadi Vainbrand" |
| } |
| ], |
| "descriptions": [ |
| { |
| "lang": "en", |
| "supportingMedia": [ |
| { |
| "base64": false, |
| "type": "text/html", |
| "value": "A NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration.<br><br>Users are recommended to upgrade to version 2.4.67, which fixes this issue." |
| } |
| ], |
| "value": "A NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes this issue." |
| } |
| ], |
| "metrics": [ |
| { |
| "other": { |
| "content": { |
| "text": "low" |
| }, |
| "type": "Textual description of severity" |
| } |
| } |
| ], |
| "problemTypes": [ |
| { |
| "descriptions": [ |
| { |
| "cweId": "CWE-476", |
| "description": "CWE-476 NULL Pointer Dereference", |
| "lang": "en", |
| "type": "CWE" |
| } |
| ] |
| } |
| ], |
| "providerMetadata": { |
| "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09" |
| }, |
| "source": { |
| "discovery": "EXTERNAL" |
| }, |
| "timeline": [ |
| { |
| "lang": "en", |
| "time": "2026-03-04T12:15:00.000Z", |
| "value": "Report received" |
| }, |
| { |
| "lang": "eng", |
| "time": "2026-05-04", |
| "value": "2.4.67 released" |
| }, |
| { |
| "lang": "en", |
| "time": "2026-05-04T12:00:00.000Z", |
| "value": "fixed in 2.4.x by r1933358" |
| } |
| ], |
| "title": "mod_authn_socache crash", |
| "x_generator": { |
| "engine": "Vulnogram 0.2.0" |
| }, |
| "references": [ |
| { |
| "tags": [ |
| "vendor-advisory" |
| ], |
| "url": "https://httpd.apache.org/security/vulnerabilities_24.html" |
| } |
| ] |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", |
| "cveId": "CVE-2026-33007", |
| "serial": 1, |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.1", |
| "CNA_private": { |
| "emailed": null, |
| "projecturl": null, |
| "owner": "httpd", |
| "state": "RESERVED", |
| "todo": [], |
| "type": "unsure" |
| } |
| } |