SB2012041804 - Buffer overflow in nginx
Published: April 18, 2012 Updated: July 28, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2012-2089)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
Remediation
Install update from vendor's website.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079388.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079467.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079474.html
- http://nginx.org/en/security_advisories.html
- http://www.openwall.com/lists/oss-security/2012/04/12/9
- http://www.securityfocus.com/bid/52999
- http://www.securitytracker.com/id?1026924
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74831