Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4476: NULL Pointer Dereference

0
Medium
VulnerabilityCVE-2025-4476cvecve-2025-4476
Published: Fri May 16 2025 (05/16/2025, 17:56:58 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A denial-of-service vulnerability has been identified in the libsoup HTTP client library. This flaw can be triggered when a libsoup client receives a 401 (Unauthorized) HTTP response containing a specifically crafted domain parameter within the WWW-Authenticate header. Processing this malformed header can lead to a crash of the client application using libsoup. An attacker could exploit this by setting up a malicious HTTP server. If a user's application using the vulnerable libsoup library connects to this malicious server, it could result in a denial-of-service. Successful exploitation requires tricking a user's client application into connecting to the attacker's malicious server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:34:07 UTC

Technical Analysis

CVE-2025-4476 identifies a denial-of-service vulnerability in the libsoup HTTP client library, specifically affecting Red Hat Enterprise Linux 10. The vulnerability arises from improper handling of the WWW-Authenticate header in HTTP 401 Unauthorized responses. When the header contains a specially crafted domain parameter, libsoup dereferences a NULL pointer, causing the client application to crash. This flaw can be exploited by an attacker who sets up a malicious HTTP server that sends such a crafted response. When a vulnerable client connects to this server, it triggers the crash, resulting in denial of service. The vulnerability requires no privileges and no authentication but does require the user or application to initiate a connection to the malicious server, implying some user interaction or automated client behavior. The CVSS 3.1 base score is 4.3, reflecting medium severity due to the limited impact scope (availability only) and the requirement for user interaction. There are no known exploits in the wild, and no patches or mitigations have been officially published at the time of disclosure. The vulnerability affects all versions of libsoup used in Red Hat Enterprise Linux 10, which is widely deployed in enterprise environments. The flaw does not compromise confidentiality or integrity but can disrupt service availability, potentially impacting applications relying on libsoup for HTTP communications.

Potential Impact

The primary impact of CVE-2025-4476 is denial of service, where client applications using the vulnerable libsoup library crash upon receiving a maliciously crafted 401 response. This can disrupt normal operations of software relying on libsoup for HTTP communications, potentially causing application downtime or degraded service availability. While it does not expose sensitive data or allow unauthorized access, the loss of availability can affect business continuity, especially in automated systems or environments where client applications must maintain persistent HTTP connections. Organizations with critical infrastructure or services depending on Red Hat Enterprise Linux 10 and libsoup may experience interruptions if targeted by attackers setting up malicious HTTP servers. The requirement for user or application interaction limits the attack surface but does not eliminate risk, particularly in environments where clients connect to external or untrusted servers. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2025-4476, organizations should: 1) Restrict client applications from connecting to untrusted or unknown HTTP servers, especially those that may respond with 401 Unauthorized headers. 2) Implement network-level controls such as firewall rules or proxy filtering to block or monitor suspicious HTTP traffic that could contain malformed WWW-Authenticate headers. 3) Monitor application logs for unexpected crashes or abnormal HTTP responses indicating potential exploitation attempts. 4) Update libsoup and Red Hat Enterprise Linux 10 packages promptly once official patches or updates are released by vendors. 5) Consider application-level timeout and retry logic to handle unexpected HTTP errors gracefully without crashing. 6) Employ endpoint protection solutions capable of detecting anomalous application behavior related to HTTP client crashes. 7) Educate users and administrators about the risk of connecting to untrusted HTTP servers and encourage cautious browsing and application usage. These steps go beyond generic advice by focusing on controlling exposure to malicious HTTP responses and preparing for graceful failure handling until patches are available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-08T21:17:08.702Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebad3

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/27/2026, 2:34:07 PM

Last updated: 3/25/2026, 2:54:38 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses