← Volver a CVEs
CVE-2023-25155
MEDIUM5.5
Descripcion
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.
Detalles CVE
Puntuacion CVSS v3.15.5
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado3/2/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
redis:redis
Debilidades (CWE)
CWE-190CWE-190
Referencias
https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619(security-advisories@github.com)
https://github.com/redis/redis/releases/tag/6.0.18(security-advisories@github.com)
https://github.com/redis/redis/releases/tag/6.2.11(security-advisories@github.com)
https://github.com/redis/redis/releases/tag/7.0.9(security-advisories@github.com)
https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83(security-advisories@github.com)
https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/redis/redis/releases/tag/6.0.18(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/redis/redis/releases/tag/6.2.11(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/redis/redis/releases/tag/7.0.9(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.