nginx 1.1.x < 1.23.2 / 1.0.x < 1.22.1 Memory Disclosure

high Nessus Plugin ID 166545

Synopsis

The remote web server is affected by a memory disclosure avulnerability.

Description

According to its Server response header, the installed version of nginx is 1.0.x prior to 1.22.1 or 1.1.x prior to 1.23.2. It is, therefore, affected by a memory disclosure in the ngx_http_mp4_module that allows an attacker to cause a worker process crash or worker process memory disclosure. The issues only affect nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the mp4 directive is used in the configuration file.
Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to nginx 1.22.1 or 1.23.2 or later.

See Also

http://nginx.org/download/patch.2022.mp4.txt

http://www.nessus.org/u?fd7e4ded

Plugin Details

Severity: High

ID: 166545

File Name: nginx-CVE-2022-41742.nasl

Version: 1.6

Type: combined

Agent: unix

Family: Web Servers

Published: 10/26/2022

Updated: 10/31/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2022-41741

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:nginx:nginx

Required KB Items: Settings/ParanoidReport, installed_sw/nginx

Exploit Ease: No known exploits are available

Patch Publication Date: 10/19/2022

Vulnerability Publication Date: 10/19/2022

Reference Information

CVE: CVE-2022-41741, CVE-2022-41742

IAVA: 2022-A-0440-S