Lucene search

K
freebsdFreeBSDB17BCE48-B7C6-11ED-B304-080027F5FEC9
HistoryFeb 28, 2023 - 12:00 a.m.

redis -- multiple vulnerabilities

2023-02-2800:00:00
vuxml.freebsd.org
20
redis
vulnerabilities
denial-of-service
integer overflow
cpu time
unix

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

50.5%

The Redis core team reports:

CVE-2023-25155

      Specially crafted SRANDMEMBER, ZRANDMEMBER, and
      HRANDFIELD commands can trigger an integer overflow,
      resulting in a runtime assertion and termination of the
      Redis server process.

CVE-2022-36021

      String matching commands (like SCAN or KEYS) with a
      specially crafted pattern to trigger a denial-of-service
      attack on Redis, causing it to hang and consume 100% CPU
      time.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchredis< 7.0.9UNKNOWN
FreeBSDanynoarchredis-devel< 7.0.9.20230228UNKNOWN
FreeBSDanynoarchredis62< 6.2.11UNKNOWN
FreeBSDanynoarchredis6< 6.0.18UNKNOWN

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

50.5%