CVE-2024-38477

Severity
7.5HIGH
EPSS
1.1%
top 21.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 1
Latest updateOct 21

Description

null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

NVDapache/http_server2.4.02.4.60
Alpineapache2< 2.4.60-r0+6
Debianapache2< 2.4.61-1~deb11u1+3

🔴Vulnerability Details

11
OSV
linux-azure-fips vulnerabilities2025-10-21
OSV
linux-azure-fips vulnerabilities2025-10-13
OSV
linux-azure, linux-azure-5.4 vulnerabilities2025-10-13
OSV
linux-oracle vulnerabilities2025-10-13
OSV
linux-aws-fips, linux-fips, linux-gcp-fips vulnerabilities2025-10-02

📋Vendor Advisories

6
Oracle
Oracle Oracle Fusion Middleware Risk Matrix: Core (Apache HTTP Server) — CVE-2024-384772025-07-15
Apple
CVE-2024-38477: macOS Sequoia 15.12024-10-28
Ubuntu
Apache HTTP Server vulnerabilities2024-09-18
Ubuntu
Apache HTTP Server vulnerabilities2024-07-08
Red Hat
httpd: NULL pointer dereference in mod_proxy2024-07-01

💬Community

1
HackerOne
important: Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious request (CVE-2024-38477)2024-07-13
CVE-2024-38477 (HIGH CVSS 7.5) | null pointer dereference in mod_pro | cvebase.io