First published: Tue Apr 17 2012(Updated: )
Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX | >=1.0.7<=1.0.14 | |
F5 NGINX | >=1.1.3<=1.1.18 | |
Fedora | =15 | |
Fedora | =16 | |
Fedora | =17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2089 has a high severity rating due to its potential to allow remote attackers to execute arbitrary code or cause a denial of service.
To fix CVE-2012-2089, upgrade nginx to version 1.0.15 or later for 1.0.x versions and to version 1.1.19 or later for 1.1.x versions.
CVE-2012-2089 affects nginx versions from 1.0.7 to 1.0.14 and from 1.1.3 to 1.1.18.
Yes, CVE-2012-2089 can be exploited by sending a crafted MP4 file to the nginx server.
CVE-2012-2089 impacts systems running affected versions of nginx and specific Fedora releases, such as Fedora 15, 16, and 17.