← Zuruck zu CVEs
CVE-2021-32672
MEDIUM5.3
Beschreibung
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
CVE Details
CVSS v3.1 Bewertung5.3
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
AngriffsvektorNETWORK
KomplexitatHIGH
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht10/4/2021
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
debian:debian_linuxfedoraproject:fedoranetapp:management_services_for_element_softwarenetapp:management_services_for_netapp_hcioracle:communications_operations_monitorredhat:enterprise_linuxredhat:software_collectionsredis:redis
Schwachen (CWE)
CWE-125CWE-125
Referenzen
https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd(security-advisories@github.com)
https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/(security-advisories@github.com)
https://security.gentoo.org/glsa/202209-17(security-advisories@github.com)
https://security.netapp.com/advisory/ntap-20211104-0003/(security-advisories@github.com)
https://www.debian.org/security/2021/dsa-5001(security-advisories@github.com)
https://www.oracle.com/security-alerts/cpuapr2022.html(security-advisories@github.com)
https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202209-17(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20211104-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-5001(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2022.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.