CVE-2012-2089

Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*

History

21 Nov 2024, 01:38

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079388.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079388.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079467.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079467.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079474.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079474.html - Third Party Advisory
References () http://nginx.org/en/security_advisories.html - Patch, Vendor Advisory () http://nginx.org/en/security_advisories.html - Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2012/04/12/9 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2012/04/12/9 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/52999 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/52999 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1026924 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1026924 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/74831 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/74831 - Third Party Advisory, VDB Entry

Information

Published : 2012-04-17 21:55

Updated : 2024-11-21 01:38


NVD link : CVE-2012-2089

Mitre link : CVE-2012-2089

CVE.ORG link : CVE-2012-2089


JSON object : View

Products Affected

f5

  • nginx

fedoraproject

  • fedora
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')