A NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration.
Users are recommended to upgrade to version 2.4.67, which fixes this issue.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://httpd.apache.org/security/vulnerabilities_24.html |
|
History
Mon, 04 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 04 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration. Users are recommended to upgrade to version 2.4.67, which fixes this issue. | |
| Title | Apache HTTP Server: mod_authn_socache crash | |
| Weaknesses | CWE-476 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-05-04T15:13:14.598Z
Reserved: 2026-03-17T16:46:05.025Z
Link: CVE-2026-33007
Updated: 2026-05-04T15:13:09.590Z
Status : Undergoing Analysis
Published: 2026-05-04T15:16:04.107
Modified: 2026-05-04T16:16:01.877
Link: CVE-2026-33007
No data.
OpenCVE Enrichment
Updated: 2026-05-04T16:30:03Z