Lucene search

K
nvd[email protected]NVD:CVE-2024-7347
HistoryAug 14, 2024 - 3:15 p.m.

CVE-2024-7347

2024-08-1415:15:31
CWE-125
CWE-126
web.nvd.nist.gov
11
nginx
mp4
vulnerability
memory over-read
ngx_http_mp4_module
configuration file

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0

Percentile

13.3%

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected configurations

Nvd
Node
f5nginx_open_sourceRange1.5.131.26.2
OR
f5nginx_plusRanger27r31
OR
f5nginx_plusMatchr31-
OR
f5nginx_plusMatchr31p1
OR
f5nginx_plusMatchr32-
VendorProductVersionCPE
f5nginx_open_source*cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
f5nginx_plus*cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*
f5nginx_plusr31cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*
f5nginx_plusr31cpe:2.3:a:f5:nginx_plus:r31:p1:*:*:*:*:*:*
f5nginx_plusr32cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:*

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0

Percentile

13.3%