Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2012/04/12/9 | Mailing List Patch Third Party Advisory |
http://nginx.org/en/security_advisories.html | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74831 | Third Party Advisory VDB Entry |
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079474.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079467.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079388.html | Third Party Advisory |
http://www.securitytracker.com/id?1026924 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/52999 | Third Party Advisory VDB Entry |
Information
Published : 2012-04-17 14:55
Updated : 2021-11-10 07:57
NVD link : CVE-2012-2089
Mitre link : CVE-2012-2089
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
f5
- nginx
fedoraproject
- fedora