← Retour aux CVEs
CVE-2021-32672
MEDIUM5.3
Description
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
Details CVE
Score CVSS v3.15.3
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisLOW
Interaction utilisateurNONE
Publie10/4/2021
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
debian:debian_linuxfedoraproject:fedoranetapp:management_services_for_element_softwarenetapp:management_services_for_netapp_hcioracle:communications_operations_monitorredhat:enterprise_linuxredhat:software_collectionsredis:redis
Faiblesses (CWE)
CWE-125CWE-125
References
https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd(security-advisories@github.com)
https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/(security-advisories@github.com)
https://security.gentoo.org/glsa/202209-17(security-advisories@github.com)
https://security.netapp.com/advisory/ntap-20211104-0003/(security-advisories@github.com)
https://www.debian.org/security/2021/dsa-5001(security-advisories@github.com)
https://www.oracle.com/security-alerts/cpuapr2022.html(security-advisories@github.com)
https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202209-17(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20211104-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-5001(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2022.html(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.