NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its termination or potential other impact using a specially crafted audio or video file. The issue affects only NGINX products that are built with the ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
24 Mar 2023, 18:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Dec 2022, 02:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5281 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPRVYA4FS34VWB4FEFYNAD7Z2LFCJVEI/ - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FD6M3PVVKO35WLAA7GLDBS6TEQ26SM64/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WBORRVG7VVXYOAIAD64ZHES2U2VIUKFQ/ - Mailing List, Third Party Advisory |
23 Nov 2022, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Oct 2022, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Oct 2022, 17:11
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:a:f5:nginx:r2:*:*:*:open_source_subscription:*:*:* cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:* cpe:2.3:a:f5:nginx:*:*:*:*:open_source:*:*:* cpe:2.3:a:f5:nginx:*:*:*:*:plus:*:*:* cpe:2.3:a:f5:nginx:r1:*:*:*:open_source_subscription:*:*:* cpe:2.3:a:f5:nginx:1.23.1:*:*:*:open_source:*:*:* cpe:2.3:a:f5:nginx:1.23.0:*:*:*:open_source:*:*:* |
|
References | (MISC) https://support.f5.com/csp/article/K81926432 - Mitigation, Vendor Advisory |
19 Oct 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-19 22:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-41741
Mitre link : CVE-2022-41741
CVE.ORG link : CVE-2022-41741
JSON object : View
Products Affected
fedoraproject
- fedora
f5
- nginx
- nginx_ingress_controller
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write