Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-32647

Опубликовано: 24 мар. 2026
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

A flaw was found in NGINX's ngx_http_mp4_module. This Out-of-Bounds Read/Write vulnerability occurs due to improper handling of specially crafted MP4 files. A local authenticated attacker, by supplying a malicious MP4 file, can trigger a buffer over-read or overwrite in worker memory. This can lead to process termination, potentially causing a denial-of-service or, under certain conditions, achieving code execution.

Отчет

This IMPORTANT vulnerability in the NGINX ngx_http_mp4_module is due to improper handling of specially crafted MP4 files. A local authenticated attacker could exploit this flaw by providing a malicious MP4 file, leading to a denial of service or potentially arbitrary code execution. Red Hat products utilizing NGINX with the ngx_http_mp4_module enabled are affected if untrusted MP4 files are processed.

Меры по смягчению последствий

To mitigate this issue, disable the ngx_http_mp4_module in your NGINX configuration if MP4 file processing is not required. This can be done by commenting out or removing the mp4 directive from the NGINX configuration file. After modifying the configuration, a reload or restart of the NGINX service is required for the changes to take effect. Alternatively, restrict access to the NGINX server to trusted networks and users to prevent the upload and processing of malicious MP4 files.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Lightspeed proxy 1insights-proxy/insights-proxy-container-rhel9Affected
Red Hat Enterprise Linux 10nginxFixedRHSA-2026:690607.04.2026
Red Hat Enterprise Linux 8nginxFixedRHSA-2026:690707.04.2026
Red Hat Enterprise Linux 9nginxFixedRHSA-2026:692307.04.2026
Red Hat Enterprise Linux 9nginxFixedRHSA-2026:700208.04.2026
Red Hat Enterprise Linux 9nginxFixedRHSA-2026:734309.04.2026
Red Hat Hardened Imagesnginx-main-1.30.0-1.hum1FixedRHSA-2026:834615.04.2026
Red Hat Update Infrastructure 5rhui5/cds-rhel9FixedRHSA-2026:1006523.04.2026
Red Hat Update Infrastructure 5rhui5/rhua-rhel9FixedRHSA-2026:1006523.04.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2449598nginx: NGINX: Denial of Service or Code Execution via specially crafted MP4 files

EPSS

Процентиль: 2%
0.00013
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 1 месяца назад

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 7.8
nvd
около 1 месяца назад

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 7.8
msrc
около 1 месяца назад

NGINX ngx_http_mp4_module vulnerability

CVSS3: 7.8
debian
около 1 месяца назад

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_ ...

CVSS3: 7.8
github
около 1 месяца назад

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

EPSS

Процентиль: 2%
0.00013
Низкий

7.8 High

CVSS3