Comment 0 for bug 1801983

Revision history for this message
Thomas Ward (teward) wrote :

The following was put out in a security advisory notice over nginx-announce's mailing list today:

Hello!

A security issue was identified in the ngx_http_mp4_module, which might
allow an attacker to cause infinite loop in a worker process, cause a
worker process crash, or might result in worker process memory
disclosure by using a specially crafted mp4 file (CVE-2018-16845).

The issue only affects nginx if it is built with the ngx_http_mp4_module
(the module is not built by default) and the "mp4" directive is used in
the configuration file. Further, the attack is only possible if an
attacker is able to trigger processing of a specially crafted mp4 file
with the ngx_http_mp4_module.

The issue affects nginx 1.1.3+, 1.0.7+.
The issue is fixed in 1.15.6, 1.14.1.

Patch for the issue can be found here:

http://nginx.org/download/patch.2018.mp4.txt

------

Based on the version strings specified, the following Ubuntu versions of nginx are affected:

* Trusty (1.4.6-1ubuntu3, 1.4.6-1ubuntu3.8)
* Xenial (1.9.15-0ubuntu1, 1.10.3-0ubuntu0.16.04.2)
* Bionic (1.14.0-0ubuntu1, 1.14.0-0ubuntu1.1)
* Cosmic (1.15.0-0ubuntu1, 1.15.0-0ubuntu2)
* Disco (1.15.0-0ubuntu1, 1.15.0-0ubuntu3)