Логотип exploitDog
bind:"BDU:2021-02584" OR bind:"CVE-2021-29478"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2021-02584" OR bind:"CVE-2021-29478"

Количество 7

Количество 7

fstec логотип

BDU:2021-02584

больше 4 лет назад

Уязвимость системы управления базами данных (СУБД) Redis, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2021-29478

почти 5 лет назад

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `set-max-intset-entries` configuration parameter. This can be done using ACL to restrict unprivileged users from using the `CONFIG SET` command.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2021-29478

почти 5 лет назад

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `set-max-intset-entries` configuration parameter. This can be done using ACL to restrict unprivileged users from using the `CONFIG SET` command.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2021-29478

почти 5 лет назад

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `set-max-intset-entries` configuration parameter. This can be done using ACL to restrict unprivileged users from using the `CONFIG SET` command.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-29478

почти 5 лет назад

Redis is an open source (BSD licensed), in-memory data structure store ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0682-1

почти 5 лет назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1652-1

больше 4 лет назад

Security update for redis

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2021-02584

Уязвимость системы управления базами данных (СУБД) Redis, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный

CVSS3: 7.5
2%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2021-29478

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `set-max-intset-entries` configuration parameter. This can be done using ACL to restrict unprivileged users from using the `CONFIG SET` command.

CVSS3: 7.5
2%
Низкий
почти 5 лет назад
redhat логотип
CVE-2021-29478

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `set-max-intset-entries` configuration parameter. This can be done using ACL to restrict unprivileged users from using the `CONFIG SET` command.

CVSS3: 7.5
2%
Низкий
почти 5 лет назад
nvd логотип
CVE-2021-29478

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `set-max-intset-entries` configuration parameter. This can be done using ACL to restrict unprivileged users from using the `CONFIG SET` command.

CVSS3: 7.5
2%
Низкий
почти 5 лет назад
debian логотип
CVE-2021-29478

Redis is an open source (BSD licensed), in-memory data structure store ...

CVSS3: 7.5
2%
Низкий
почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0682-1

Security update for redis

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:1652-1

Security update for redis

больше 4 лет назад

Уязвимостей на страницу