Описание
Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol is not a violation of the Redis Security Model.
Релиз | Статус | Примечание |
---|---|---|
devel | needs-triage | |
esm-apps/bionic | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | needs-triage | |
esm-apps/xenial | needs-triage | |
esm-infra-legacy/trusty | needs-triage | |
jammy | needs-triage | |
noble | needs-triage | |
plucky | needs-triage |
Показывать по
EPSS
3.5 Low
CVSS3
Связанные уязвимости
Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol is not a violation of the Redis Security Model.
Redis through 8.0.3 allows memory consumption via a multi-bulk command ...
Redis through 7.4.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions.
Уязвимость системы управления базами данных (СУБД) Redis, связанная с неконтролируемым распределением памяти, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
3.5 Low
CVSS3