Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-32625

Опубликовано: 01 июн. 2021
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The problem is fixed in version 6.2.4 and 6.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the STRALGO LCS command. On 64 bit systems which have the fixes of CVE-2021-29477 (6.2.3 or 6.0.13), it is sufficient to make sure that the proto-max-bulk-len config parameter is smaller than 2GB (default is 512MB).

A flaw was found in Redis. An integer overflow could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

This issue only affects 32-bit Redis version 6.0 or newer. The Redis module streams shipped with Red Hat Enterprise Linux 8 are not affected by this flaw:

  • redis:5 does not include a vulnerable version of Redis.
  • redis:6 does not provide support for 32-bit Redis.

Меры по смягчению последствий

The flaw can be mitigated by disallowing usage of the STRALGO LCS command via ACL configuration. Please see https://redis.io/topics/acl for more information on how to do this. On 64 bit systems which have the fixes of CVE-2021-29477 (6.2.3 or 6.0.13), it is sufficient to make sure that the proto-max-bulk-len config parameter is smaller than 2GB (default is 512MB).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2redisgraph-tlsNot affected
Red Hat Ansible Automation Platform 1.2redisNot affected
Red Hat Ansible Tower 3redisNot affected
Red Hat Enterprise Linux 8redis:5/redisNot affected
Red Hat Enterprise Linux 8redis:6/redisNot affected
Red Hat Enterprise Linux 9redisNot affected
Red Hat OpenStack Platform 10 (Newton)redisNot affected
Red Hat OpenStack Platform 13 (Queens)redisNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-190->CWE-125
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1980790redis: Heap corruption via `STRALGO LCS` command (Incomplete fix for CVE-2021-29477)

EPSS

Процентиль: 86%
0.02747
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The problem is fixed in version 6.2.4 and 6.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the STRALGO LCS command. On 64 bit systems which have the fixes of CVE-2021-29477 (6.2.3 or 6.0.13), it is sufficient to make sure that the proto-max-bulk-len config parameter is smaller than 2GB (default is 512MB).

CVSS3: 7.5
nvd
больше 4 лет назад

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The problem is fixed in version 6.2.4 and 6.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the STRALGO LCS command. On 64 bit systems which have the fixes of CVE-2021-29477 (6.2.3 or 6.0.13), it is sufficient to make sure that the proto-max-bulk-len config parameter is smaller than 2GB (default is 512MB).

CVSS3: 7.5
debian
больше 4 лет назад

Redis is an open source (BSD licensed), in-memory data structure store ...

suse-cvrf
больше 4 лет назад

Security update for redis

suse-cvrf
больше 4 лет назад

Security update for redis

EPSS

Процентиль: 86%
0.02747
Низкий

8.8 High

CVSS3