Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-7347

Опубликовано: 14 авг. 2024
Источник: redhat
CVSS3: 4.7

Описание

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

A flaw was found in the ngx_http_mp4_module module of Nginx. Processing a specially crafted MP4 file can trigger a buffer over-read and cause the nginx process to terminate, resulting in a denial of service.

Отчет

This issue only affects configurations with the ngx_http_mp4_module module loaded and being used. Additionally, to exploit this flaw, an attacker must be able to send and process a specially crafted MP4 file with the ngx_http_mp4_module module. This module can be disable via the configuration file if its functionality is not needed. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-126: Buffer Over-read vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Memory access boundaries are enforced through secure coding practices, including bounds checking and automated detection of over-read conditions during development. Static analysis and peer reviews catch improper memory handling early, reducing the risk of vulnerabilities reaching production. Memory protection mechanisms restrict access to allocated regions at runtime, and process isolation contains memory faults within the affected workload. Additionally, a defense-in-depth monitoring strategy supports real-time detection of anomalous memory activity, enabling rapid response and limiting potential impact.

Меры по смягчению последствий

Restrict publishing of audio and video to trusted users only.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 1.2nginxWill not fix
Red Hat Enterprise Linux 10nginxNot affected
Red Hat Enterprise Linux 8nginx:1.22/nginxWill not fix
Red Hat Enterprise Linux 8nginx:1.24/nginxWill not fix
Red Hat Enterprise Linux 9nginxFixedRHSA-2025:326126.03.2025
Red Hat Enterprise Linux 9nginxFixedRHSA-2025:326226.03.2025
Red Hat Enterprise Linux 9nginxFixedRHSA-2025:740213.05.2025
Red Hat Enterprise Linux 9.2 Extended Update SupportnginxFixedRHSA-2025:754614.05.2025
Red Hat Enterprise Linux 9.2 Extended Update SupportnginxFixedRHSA-2025:754814.05.2025
Red Hat Enterprise Linux 9.4 Extended Update SupportnginxFixedRHSA-2025:754214.05.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-126
https://bugzilla.redhat.com/show_bug.cgi?id=2304966nginx: specially crafted MP4 file may cause denial of service

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
ubuntu
10 месяцев назад

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 4.7
nvd
10 месяцев назад

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 4.7
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 4.7
debian
10 месяцев назад

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_ ...

CVSS3: 4.7
redos
10 месяцев назад

Уязвимость nginx

4.7 Medium

CVSS3