Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2018-16845

Publication date 6 November 2018

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

6.1 · Medium

Score breakdown

nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.

Read the notes from the security team

Status

Package Ubuntu Release Status
nginx 18.10 cosmic
Fixed 1.15.5-0ubuntu2.1
18.04 LTS bionic
Fixed 1.14.0-0ubuntu1.2
16.04 LTS xenial
Fixed 1.10.3-0ubuntu0.16.04.3
14.04 LTS trusty
Fixed 1.4.6-1ubuntu3.9

Notes


mdeslaur

module is built in the nginx-extras package

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
nginx

Severity score breakdown

Parameter Value
Base score 6.1 · Medium
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality Low
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-3812-1
    • nginx vulnerabilities
    • 7 November 2018

Other references