Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-41056
HistoryJan 10, 2024 - 4:15 p.m.

CVE-2023-41056

2024-01-1016:15:46
Debian Security Bug Tracker
security-tracker.debian.org
52
redis
memory buffer
overflow
cve-2023-41056
integer overflow
heap overflow
remote code execution
patch
version 7.0.15
version 7.2.4
unix

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.007

Percentile

81.1%

Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.007

Percentile

81.1%