Lucene search

K
cvelistF5CVELIST:CVE-2022-41741
HistoryOct 19, 2022 - 12:00 a.m.

CVE-2022-41741 NGINX ngx_http_mp4_module vulnerability CVE-2022-41741

2022-10-1900:00:00
CWE-787
f5
www.cve.org

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its termination or potential other impact using a specially crafted audio or video file. The issue affects only NGINX products that are built with the ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module.

CNA Affected

[
  {
    "vendor": "F5",
    "product": "NGINX",
    "versions": [
      {
        "version": "Mainline",
        "status": "affected",
        "lessThan": "1.23.2",
        "versionType": "custom"
      },
      {
        "version": "Stable",
        "status": "affected",
        "lessThan": "1.22.1",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "F5",
    "product": "NGINX Plus",
    "versions": [
      {
        "version": "R27",
        "status": "affected",
        "lessThan": "R27-p1",
        "versionType": "custom"
      },
      {
        "version": "R1",
        "status": "affected",
        "lessThan": "R26-p1",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "F5",
    "product": "NGINX Open Source Subscription",
    "versions": [
      {
        "version": "R2",
        "status": "affected",
        "lessThan": "R2 P1",
        "versionType": "custom"
      },
      {
        "version": "R1",
        "status": "affected",
        "lessThan": "R1 P1",
        "versionType": "custom"
      }
    ]
  }
]

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%