Users are recommended to upgrade to version 2.4.67, which fixes this issue.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6248-1 | apache2 security update |
Ubuntu USN |
USN-8239-1 | Apache HTTP Server vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* |
Mon, 04 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 04 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache http Server |
|
| Vendors & Products |
Apache
Apache http Server |
Mon, 04 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 04 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration. Users are recommended to upgrade to version 2.4.67, which fixes this issue. | |
| Title | Apache HTTP Server: mod_authn_socache crash | |
| Weaknesses | CWE-476 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-05-05T15:07:42.103Z
Reserved: 2026-03-17T16:46:05.025Z
Link: CVE-2026-33007
Updated: 2026-05-04T17:32:48.215Z
Status : Analyzed
Published: 2026-05-04T15:16:04.107
Modified: 2026-05-04T20:22:13.073
Link: CVE-2026-33007
No data.
OpenCVE Enrichment
Updated: 2026-05-04T18:00:05Z
Debian DSA
Ubuntu USN