Integer Overflow or Wraparound Affecting rh-nginx18-nginx package, versions <1:1.8.1-1.el7.1


Severity

Recommended
0.0
high
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.23% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-RHNGINX18NGINX-4720696
  • published1 Nov 2021
  • disclosed6 Nov 2018

Introduced: 6 Nov 2018

CVE-2018-16845  (opens in a new tab)
CWE-190  (opens in a new tab)
CWE-201  (opens in a new tab)

How to fix?

Upgrade RHEL:7 rh-nginx18-nginx to version 1:1.8.1-1.el7.1 or higher.
This issue was patched in RHSA-2018:3652.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rh-nginx18-nginx package and not the rh-nginx18-nginx package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.

CVSS Scores

version 3.1