Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-32625

Опубликовано: 02 июн. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.5
CVSS3: 7.5

Описание

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The problem is fixed in version 6.2.4 and 6.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the STRALGO LCS command. On 64 bit systems which have the fixes of CVE-2021-29477 (6.2.3 or 6.0.13), it is sufficient to make sure that the proto-max-bulk-len config parameter is smaller than 2GB (default is 512MB).

РелизСтатусПримечание
bionic

not-affected

devel

not-affected

5:6.0.14-1
esm-apps/bionic

not-affected

esm-apps/focal

not-affected

esm-apps/jammy

not-affected

5:6.0.14-1
esm-apps/noble

not-affected

5:6.0.14-1
esm-apps/xenial

needed

esm-infra-legacy/trusty

needed

focal

not-affected

groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 86%
0.02747
Низкий

6.5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
redhat
больше 4 лет назад

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The problem is fixed in version 6.2.4 and 6.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the STRALGO LCS command. On 64 bit systems which have the fixes of CVE-2021-29477 (6.2.3 or 6.0.13), it is sufficient to make sure that the proto-max-bulk-len config parameter is smaller than 2GB (default is 512MB).

CVSS3: 7.5
nvd
больше 4 лет назад

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The problem is fixed in version 6.2.4 and 6.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the STRALGO LCS command. On 64 bit systems which have the fixes of CVE-2021-29477 (6.2.3 or 6.0.13), it is sufficient to make sure that the proto-max-bulk-len config parameter is smaller than 2GB (default is 512MB).

CVSS3: 7.5
debian
больше 4 лет назад

Redis is an open source (BSD licensed), in-memory data structure store ...

suse-cvrf
больше 4 лет назад

Security update for redis

suse-cvrf
больше 4 лет назад

Security update for redis

EPSS

Процентиль: 86%
0.02747
Низкий

6.5 Medium

CVSS2

7.5 High

CVSS3