CVE-2024-7347

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
f5CNA
4.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
VendorProductVersion
f5nginx_open_source
1.5.13 ≤
𝑥
< 1.26.2
f5nginx_open_source
1.27.0
f5nginx_plus
r27 ≤
𝑥
< r31
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
nginx
bullseye
vulnerable
bullseye (security)
1.18.0-6.1+deb11u4
fixed
bookworm
1.22.1-9+deb12u2
fixed
trixie
1.26.3-2
fixed
sid
1.26.3-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nginx
oracular
not-affected
noble
Fixed 1.24.0-2ubuntu7.1
released
jammy
Fixed 1.18.0-6ubuntu14.5
released
focal
Fixed 1.18.0-0ubuntu1.6
released
bionic
Fixed 1.14.0-0ubuntu1.11+esm1
released
xenial
Fixed 1.10.3-0ubuntu0.16.04.5+esm6
released
trusty
Fixed 1.4.6-1ubuntu3.9+esm5
released