CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted audio or video file. The issue affects only NGINX products that are built with the module ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module.
[
{
"vendor": "F5",
"product": "NGINX",
"versions": [
{
"version": "Mainline",
"status": "affected",
"lessThan": "1.23.2",
"versionType": "custom"
},
{
"version": "Stable",
"status": "affected",
"lessThan": "1.22.1",
"versionType": "custom"
}
]
},
{
"vendor": "F5",
"product": "NGINX Plus",
"versions": [
{
"version": "R27",
"status": "affected",
"lessThan": "R27-p1",
"versionType": "custom"
},
{
"version": "R1",
"status": "affected",
"lessThan": "R26-p1",
"versionType": "custom"
}
]
},
{
"vendor": "F5",
"product": "NGINX Open Source Subscription",
"versions": [
{
"version": "R2",
"status": "affected",
"lessThan": "R2 P1",
"versionType": "custom"
},
{
"version": "R1",
"status": "affected",
"lessThan": "R1 P1",
"versionType": "custom"
}
]
}
]
lists.debian.org/debian-lts-announce/2022/11/msg00031.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPRVYA4FS34VWB4FEFYNAD7Z2LFCJVEI/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FD6M3PVVKO35WLAA7GLDBS6TEQ26SM64/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WBORRVG7VVXYOAIAD64ZHES2U2VIUKFQ/
security.netapp.com/advisory/ntap-20230120-0005/
support.f5.com/csp/article/K28112382
www.debian.org/security/2022/dsa-5281