Rapid7 Vulnerability & Exploit Database

Oracle Linux: CVE-2018-16845: ELSA-2020-5859: olcne nginx security update (IMPORTANT) (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: CVE-2018-16845: ELSA-2020-5859: olcne nginx security update (IMPORTANT) (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:C)
Published
11/06/2018
Created
09/28/2020
Added
10/16/2024
Modified
10/17/2024

Description

nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module. An instance of missing input sanitization was found in the mp4 module for nginx. A local attacker could create a specially crafted video file that, when streamed by the server, would cause a denial of service (server crash or hang) and, possibly, information disclosure.

Solution(s)

  • oracle-linux-upgrade-nginx
  • oracle-linux-upgrade-nginx-all-modules
  • oracle-linux-upgrade-nginx-filesystem
  • oracle-linux-upgrade-nginx-mod-http-image-filter
  • oracle-linux-upgrade-nginx-mod-http-perl
  • oracle-linux-upgrade-nginx-mod-http-xslt-filter
  • oracle-linux-upgrade-nginx-mod-mail
  • oracle-linux-upgrade-nginx-mod-stream
  • oracle-linux-upgrade-olcne-agent
  • oracle-linux-upgrade-olcne-api-server
  • oracle-linux-upgrade-olcnectl
  • oracle-linux-upgrade-olcne-istio-chart
  • oracle-linux-upgrade-olcne-nginx
  • oracle-linux-upgrade-olcne-prometheus-chart
  • oracle-linux-upgrade-olcne-utils

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;