CVE Vulnerabilities

CVE-2024-7347

Buffer Over-read

Published: Aug 14, 2024 | Modified: Jan 22, 2025
CVSS 3.x
4.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
4.7 MODERATE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Weakness

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.

Affected Software

Name Vendor Start Version End Version
Nginx_open_source F5 1.5.13 (including) 1.26.2 (excluding)
Nginx_open_source F5 1.27.0 (including) 1.27.0 (including)
Nginx_plus F5 r27 (including) r31 (excluding)
Nginx_plus F5 r31 (including) r31 (including)
Nginx_plus F5 r31-p1 (including) r31-p1 (including)
Nginx_plus F5 r32 (including) r32 (including)
Nginx Ubuntu esm-infra/bionic *
Nginx Ubuntu esm-infra/xenial *
Nginx Ubuntu focal *
Nginx Ubuntu jammy *
Nginx Ubuntu noble *
Nginx Ubuntu trusty/esm *
Nginx Ubuntu upstream *

References