Логотип exploitDog
bind: "CVE-2023-36824"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-36824"

Количество 7

Количество 7

ubuntu логотип

CVE-2023-36824

почти 2 года назад

Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.

CVSS3: 7.4
EPSS: Критический
redhat логотип

CVE-2023-36824

почти 2 года назад

Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.

CVSS3: 8.8
EPSS: Критический
nvd логотип

CVE-2023-36824

почти 2 года назад

Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.

CVSS3: 7.4
EPSS: Критический
debian логотип

CVE-2023-36824

почти 2 года назад

Redis is an in-memory database that persists on disk. In Redit 7.0 pri ...

CVSS3: 7.4
EPSS: Критический
fstec логотип

BDU:2023-04264

почти 2 года назад

Уязвимость системы управления базами данных (СУБД) Redis, cвязанная с переполнением буфера, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Критический
redos логотип

ROS-20230825-04

почти 2 года назад

Уязвимость Redis

CVSS3: 8.8
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2023:2925-1

почти 2 года назад

Security update for redis7

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-36824

Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.

CVSS3: 7.4
91%
Критический
почти 2 года назад
redhat логотип
CVE-2023-36824

Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.

CVSS3: 8.8
91%
Критический
почти 2 года назад
nvd логотип
CVE-2023-36824

Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.

CVSS3: 7.4
91%
Критический
почти 2 года назад
debian логотип
CVE-2023-36824

Redis is an in-memory database that persists on disk. In Redit 7.0 pri ...

CVSS3: 7.4
91%
Критический
почти 2 года назад
fstec логотип
BDU:2023-04264

Уязвимость системы управления базами данных (СУБД) Redis, cвязанная с переполнением буфера, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
91%
Критический
почти 2 года назад
redos логотип
ROS-20230825-04

Уязвимость Redis

CVSS3: 8.8
91%
Критический
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2925-1

Security update for redis7

почти 2 года назад

Уязвимостей на страницу