Lucene search

K
cve[email protected]CVE-2022-41741
HistoryOct 19, 2022 - 10:15 p.m.

CVE-2022-41741

2022-10-1922:15:12
CWE-787
web.nvd.nist.gov
276
8
nginx
nginx open source
nginx plus
cve-2022-41741
vulnerability
ngx_http_mp4_module
memory corruption
audio
video

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its termination or potential other impact using a specially crafted audio or video file. The issue affects only NGINX products that are built with the ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module.

Affected configurations

NVD
Node
f5nginxRange1.1.3–1.22.0open_source
OR
f5nginxRanger22–r27plus
OR
f5nginxMatch1.23.0open_source
OR
f5nginxMatch1.23.1open_source
OR
f5nginxMatchr1open_source_subscription
OR
f5nginxMatchr2open_source_subscription
OR
f5nginx_ingress_controllerRange1.9.0–1.12.4
OR
f5nginx_ingress_controllerRange2.0.0–2.4.0
Node
fedoraprojectfedoraMatch35
OR
fedoraprojectfedoraMatch36
OR
fedoraprojectfedoraMatch37
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0

CNA Affected

[
  {
    "vendor": "F5",
    "product": "NGINX",
    "versions": [
      {
        "version": "Mainline",
        "status": "affected",
        "lessThan": "1.23.2",
        "versionType": "custom"
      },
      {
        "version": "Stable",
        "status": "affected",
        "lessThan": "1.22.1",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "F5",
    "product": "NGINX Plus",
    "versions": [
      {
        "version": "R27",
        "status": "affected",
        "lessThan": "R27-p1",
        "versionType": "custom"
      },
      {
        "version": "R1",
        "status": "affected",
        "lessThan": "R26-p1",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "F5",
    "product": "NGINX Open Source Subscription",
    "versions": [
      {
        "version": "R2",
        "status": "affected",
        "lessThan": "R2 P1",
        "versionType": "custom"
      },
      {
        "version": "R1",
        "status": "affected",
        "lessThan": "R1 P1",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%