Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-35951

Опубликовано: 23 сент. 2022
Источник: debian
EPSS Высокий

Описание

Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
redisfixed5:7.0.5-1package
redisnot-affectedbullseyepackage
redisnot-affectedbusterpackage

Примечания

  • https://github.com/redis/redis/commit/fa6815e14ea5adff93c5cd7be513c02a7c6e3f2a (7.0.5)

EPSS

Процентиль: 99%
0.80412
Высокий

Связанные уязвимости

CVSS3: 7
ubuntu
больше 2 лет назад

Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.

CVSS3: 9.8
redhat
больше 2 лет назад

Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.

CVSS3: 7
nvd
больше 2 лет назад

Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.

CVSS3: 7
fstec
больше 2 лет назад

Уязвимость реализации команды XAUTOCLAIM системы управления базами данных (СУБД) Redis, позволяющая нарушителю выполнить произвольный код

redos
больше 2 лет назад

Уязвимость Redis

EPSS

Процентиль: 99%
0.80412
Высокий