Описание
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | released | 5:4.0.9-1ubuntu0.1 |
| cosmic | not-affected | 5:4.0.11-2 |
| devel | not-affected | 5:4.0.11-2 |
| esm-apps/bionic | released | 5:4.0.9-1ubuntu0.1 |
| esm-apps/xenial | released | 2:3.0.6-1ubuntu0.2 |
| esm-infra-legacy/trusty | released | 2:2.8.4-2ubuntu0.2 |
| precise/esm | DNE | |
| trusty | released | 2:2.8.4-2ubuntu0.2 |
| trusty/esm | released | 2:2.8.4-2ubuntu0.2 |
Показывать по
Ссылки на источники
4.6 Medium
CVSS2
8.4 High
CVSS3
Связанные уязвимости
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 ...
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
Уязвимость интерфейса redis-cli системы управления базами данных (СУБД) Redis, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
4.6 Medium
CVSS2
8.4 High
CVSS3