CVE Vulnerabilities

CVE-2024-7347

Buffer Over-read

Published: Aug 14, 2024 | Modified: Nov 03, 2025
CVSS 3.x
4.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
4.7 MODERATE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Weakness

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.

Affected Software

NameVendorStart VersionEnd Version
Nginx_open_sourceF51.5.13 (including)1.26.2 (excluding)
Nginx_open_sourceF51.27.0 (including)1.27.0 (including)
Nginx_plusF5r27 (including)r31 (excluding)
Nginx_plusF5r31 (including)r31 (including)
Nginx_plusF5r31-p1 (including)r31-p1 (including)
Nginx_plusF5r32 (including)r32 (including)
Red Hat Enterprise Linux 9RedHatnginx:1.22-9050020250324053651.9*
Red Hat Enterprise Linux 9RedHatnginx:1.24-9050020250324055038.9*
Red Hat Enterprise Linux 9RedHatnginx-2:1.20.1-22.el9_6.2*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatnginx-1:1.20.1-14.el9_2.3*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatnginx:1.22-9020020250414211356.9*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatnginx:1.24-9040020250414212413.9*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatnginx:1.22-9040020250408102234.9*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatnginx-1:1.20.1-16.el9_4.3*
NginxUbuntuesm-infra-legacy/trusty*
NginxUbuntuesm-infra/bionic*
NginxUbuntuesm-infra/focal*
NginxUbuntuesm-infra/xenial*
NginxUbuntufocal*
NginxUbuntujammy*
NginxUbuntunoble*
NginxUbuntutrusty/esm*
NginxUbuntuupstream*

References