vulnerability

Amazon Linux AMI 2: CVE-2024-7347: Security patch for nginx (ALASNGINX1-2024-007)

Severity
4
CVSS
(AV:L/AC:H/Au:N/C:N/I:N/A:C)
Published
Aug 14, 2024
Added
Sep 5, 2024
Modified
Jan 28, 2025

Description

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Solution(s)

amazon-linux-ami-2-upgrade-nginxamazon-linux-ami-2-upgrade-nginx-all-modulesamazon-linux-ami-2-upgrade-nginx-coreamazon-linux-ami-2-upgrade-nginx-debuginfoamazon-linux-ami-2-upgrade-nginx-filesystemamazon-linux-ami-2-upgrade-nginx-mod-develamazon-linux-ami-2-upgrade-nginx-mod-http-geoipamazon-linux-ami-2-upgrade-nginx-mod-http-image-filteramazon-linux-ami-2-upgrade-nginx-mod-http-perlamazon-linux-ami-2-upgrade-nginx-mod-http-xslt-filteramazon-linux-ami-2-upgrade-nginx-mod-mailamazon-linux-ami-2-upgrade-nginx-mod-stream
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.