Описание
Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an XAUTOCLAIM
command on a stream key in a specific state, with a specially crafted COUNT
argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.
An Integer Overflow attack vulnerability was found in Redis, an in-memory database that persists on disk. Executing a XAUTOCLAIM
command on a stream key in a specific state with a specially crafted COUNT
argument may cause an integer overflow, and a subsequent heap overflow, potentially leading to remote code execution.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Advanced Cluster Management for Kubernetes 2 | rhacm2/search-api-rhel8 | Not affected | ||
Red Hat Ansible Automation Platform 1.2 | ansible-tower | Not affected | ||
Red Hat Enterprise Linux 8 | redis:6/redis | Not affected | ||
Red Hat Enterprise Linux 9 | redis | Not affected | ||
Red Hat Fuse 7 | redis | Not affected | ||
Red Hat OpenStack Platform 13 (Queens) | redis | Not affected | ||
Red Hat Quay 3 | quay/quay-rhel8 | Not affected | ||
Red Hat Software Collections | rh-redis6-redis | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.
Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.
Redis is an in-memory database that persists on disk. Versions 7.0.0 a ...
Уязвимость реализации команды XAUTOCLAIM системы управления базами данных (СУБД) Redis, позволяющая нарушителю выполнить произвольный код
EPSS
9.8 Critical
CVSS3