NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Nginx_open_source | F5 | 1.5.13 (including) | 1.26.2 (excluding) |
Nginx_open_source | F5 | 1.27.0 (including) | 1.27.0 (including) |
Nginx_plus | F5 | r27 (including) | r31 (excluding) |
Nginx_plus | F5 | r31 (including) | r31 (including) |
Nginx_plus | F5 | r31-p1 (including) | r31-p1 (including) |
Nginx_plus | F5 | r32 (including) | r32 (including) |
Nginx | Ubuntu | esm-infra/bionic | * |
Nginx | Ubuntu | esm-infra/xenial | * |
Nginx | Ubuntu | focal | * |
Nginx | Ubuntu | jammy | * |
Nginx | Ubuntu | noble | * |
Nginx | Ubuntu | trusty/esm | * |
Nginx | Ubuntu | upstream | * |