Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-12326

Опубликовано: 13 июн. 2018
Источник: redhat
CVSS3: 3.3

Описание

Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.

The Redis command line tool 'redis-cli' is vulnerable to a buffer overflow through the -h (host) command line parameter. The redis-cli may be used by other services; if these services do not adequately filter the host input it could lead to code execution with the privilege level of that service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 3grafanaNot affected
Red Hat Enterprise Linux 8redisNot affected
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)redisWill not fix
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo) Operational ToolsredisWill not fix
Red Hat Mobile Application Platform 4rhmap-redis-dockerNot affected
Red Hat OpenStack Platform 12 (Pike)redisFix deferred
Red Hat OpenStack Platform 8 (Liberty)redisFix deferred
Red Hat OpenStack Platform 8 (Liberty) Operational ToolsredisFix deferred
Red Hat OpenStack Platform 9 (Mitaka)redisFix deferred
Red Hat OpenStack Platform 9 (Mitaka) Operational ToolsredisFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1594291redis: Code execution in redis-cli via crafted command line arguments

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 8.4
ubuntu
больше 7 лет назад

Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.

CVSS3: 8.4
nvd
больше 7 лет назад

Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.

CVSS3: 8.4
debian
больше 7 лет назад

Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 ...

CVSS3: 8.4
github
больше 3 лет назад

Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.

CVSS3: 8.4
fstec
больше 7 лет назад

Уязвимость интерфейса redis-cli системы управления базами данных (СУБД) Redis, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

3.3 Low

CVSS3