← Zuruck zu CVEs
CVE-2023-25155
MEDIUM5.5
Beschreibung
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.
CVE Details
CVSS v3.1 Bewertung5.5
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht3/2/2023
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
redis:redis
Schwachen (CWE)
CWE-190CWE-190
Referenzen
https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619(security-advisories@github.com)
https://github.com/redis/redis/releases/tag/6.0.18(security-advisories@github.com)
https://github.com/redis/redis/releases/tag/6.2.11(security-advisories@github.com)
https://github.com/redis/redis/releases/tag/7.0.9(security-advisories@github.com)
https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83(security-advisories@github.com)
https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/redis/redis/releases/tag/6.0.18(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/redis/redis/releases/tag/6.2.11(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/redis/redis/releases/tag/7.0.9(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.