Redis is an open source ANSI C, network-enabled, memory-based, and persistent logging, Key-Value storage database with a multilingual API. The vulnerability can be exploited to attack 32-bit Redis programs running on 32-bit systems by combining the BIT command with the proto-max-bulk-len configuration parameter, which can cause a shaping overflow and eventually lead to remote code execution.