Описание
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
A flaw was found in the ngx_http_mp4_module module of Nginx. Processing a specially crafted MP4 file can trigger a buffer over-read and cause the nginx process to terminate, resulting in a denial of service.
Отчет
This issue only affects configurations with the ngx_http_mp4_module module loaded and being used. Additionally, to exploit this flaw, an attacker must be able to send and process a specially crafted MP4 file with the ngx_http_mp4_module module. This module can be disable via the configuration file if its functionality is not needed. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-126: Buffer Over-read vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Memory access boundaries are enforced through secure coding practices, including bounds checking and automated detection of over-read conditions during development. Static analysis and peer reviews catch improper memory handling early, reducing the risk of vulnerabilities reaching production. Memory protection mechanisms restrict access to allocated regions at runtime, and process isolation contains memory faults within the affected workload. Additionally, a defense-in-depth monitoring strategy supports real-time detection of anomalous memory activity, enabling rapid response and limiting potential impact.
Меры по смягчению последствий
Restrict publishing of audio and video to trusted users only.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Ansible Automation Platform 1.2 | nginx | Will not fix | ||
Red Hat Enterprise Linux 10 | nginx | Not affected | ||
Red Hat Enterprise Linux 8 | nginx:1.22/nginx | Will not fix | ||
Red Hat Enterprise Linux 8 | nginx:1.24/nginx | Will not fix | ||
Red Hat Enterprise Linux 9 | nginx | Fixed | RHSA-2025:3261 | 26.03.2025 |
Red Hat Enterprise Linux 9 | nginx | Fixed | RHSA-2025:3262 | 26.03.2025 |
Red Hat Enterprise Linux 9 | nginx | Fixed | RHSA-2025:7402 | 13.05.2025 |
Red Hat Enterprise Linux 9.2 Extended Update Support | nginx | Fixed | RHSA-2025:7546 | 14.05.2025 |
Red Hat Enterprise Linux 9.2 Extended Update Support | nginx | Fixed | RHSA-2025:7548 | 14.05.2025 |
Red Hat Enterprise Linux 9.4 Extended Update Support | nginx | Fixed | RHSA-2025:7542 | 14.05.2025 |
Показывать по
Дополнительная информация
Статус:
4.7 Medium
CVSS3
Связанные уязвимости
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_ ...
4.7 Medium
CVSS3