7.8
CWE
787
Advisory Published
Updated

CVE-2022-41741

First published: Wed Oct 19 2022(Updated: )

NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its termination or potential other impact using a specially crafted audio or video file. The issue affects only NGINX products that are built with the ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module.

Credit: f5sirt@f5.com

Affected SoftwareAffected VersionHow to fix
debian/nginx<=1.14.2-2+deb10u4
1.14.2-2+deb10u5
1.18.0-6.1+deb11u3
1.22.1-9
1.24.0-2
F5 Nginx>=1.1.3<=1.22.0
F5 Nginx>=r22<=r27
F5 Nginx=1.23.0
F5 Nginx=1.23.1
F5 Nginx=r1
F5 Nginx=r2
F5 NGINX Ingress Controller>=1.9.0<=1.12.4
F5 NGINX Ingress Controller>=2.0.0<=2.4.0
Fedoraproject Fedora=35
Fedoraproject Fedora=36
Fedoraproject Fedora=37
Debian Debian Linux=10.0
Debian Debian Linux=11.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2022-41741?

    CVE-2022-41741 is a vulnerability in NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 that allows a local attacker to corrupt NGINX worker memory.

  • What is the severity of CVE-2022-41741?

    The severity of CVE-2022-41741 is high with a CVSS score of 7.8.

  • How can a local attacker exploit CVE-2022-41741?

    A local attacker can exploit CVE-2022-41741 to corrupt NGINX worker memory.

  • Which versions of NGINX Open Source and NGINX Plus are affected by CVE-2022-41741?

    NGINX Open Source versions before 1.23.2 and 1.22.1, NGINX Open Source Subscription versions before R2 P1 and R1 P1, and NGINX Plus versions before R27 P1 and R26 P1 are affected by CVE-2022-41741.

  • How can I fix CVE-2022-41741?

    To fix CVE-2022-41741, upgrade NGINX Open Source to version 1.23.2 or 1.22.1, NGINX Open Source Subscription to version R2 P1 or R1 P1, or NGINX Plus to version R27 P1 or R26 P1.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203