Lucene search

K
freebsdFreeBSD6FAE2D6C-1F38-11EE-A475-080027F5FEC9
HistoryJul 10, 2023 - 12:00 a.m.

redis -- heap overflow in COMMAND GETKEYS and ACL evaluation

2023-07-1000:00:00
vuxml.freebsd.org
21
redis
heap overflow
command getkeys
acl evaluation
unix
remote code execution
heap memory

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.005

Percentile

75.8%

Redis core team reports:

    Extracting key names from a command and a list of
    arguments may, in some cases, trigger a heap overflow and
    result in reading random heap memory, heap corruption and
    potentially remote code execution. Specifically: using
    COMMAND GETKEYS* and validation of key names in ACL rules.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchredis< 7.0.12UNKNOWN
FreeBSDanynoarchredis-devel< 7.0.12.20230710UNKNOWN

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.005

Percentile

75.8%