vulnerability
Amazon Linux AMI 2: CVE-2024-7347: Security patch for nginx (ALASNGINX1-2024-007)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:L/AC:H/Au:N/C:N/I:N/A:C) | Aug 14, 2024 | Sep 5, 2024 | Jan 28, 2025 |
Severity
4
CVSS
(AV:L/AC:H/Au:N/C:N/I:N/A:C)
Published
Aug 14, 2024
Added
Sep 5, 2024
Modified
Jan 28, 2025
Description
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Solution(s)
amazon-linux-ami-2-upgrade-nginxamazon-linux-ami-2-upgrade-nginx-all-modulesamazon-linux-ami-2-upgrade-nginx-coreamazon-linux-ami-2-upgrade-nginx-debuginfoamazon-linux-ami-2-upgrade-nginx-filesystemamazon-linux-ami-2-upgrade-nginx-mod-develamazon-linux-ami-2-upgrade-nginx-mod-http-geoipamazon-linux-ami-2-upgrade-nginx-mod-http-image-filteramazon-linux-ami-2-upgrade-nginx-mod-http-perlamazon-linux-ami-2-upgrade-nginx-mod-http-xslt-filteramazon-linux-ami-2-upgrade-nginx-mod-mailamazon-linux-ami-2-upgrade-nginx-mod-stream

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.