redis -- multiple vulnerabilities
Details
VuXML ID |
1606b03b-ac57-11eb-9bdd-8c164567ca3c |
Discovery |
2021-05-03 |
Entry |
2021-05-03 |
Redis project reports:
- Vulnerability in the STRALGO LCS command
-
An integer overflow bug in Redis version 6.0 or newer could be
exploited using the STRALGO LCS command to corrupt the heap and
potentially result with remote code execution.
- Vulnerability in the COPY command for large intsets
-
An integer overflow bug in Redis 6.2 could be exploited to corrupt
the heap and potentially result with remote code execution.
The vulnerability involves changing the default set-max-intset-entries
configuration value, creating a large set key that consists of
integer values and using the COPY command to duplicate it.
The integer overflow bug exists in all versions of Redis starting
with 2.6, where it could result with a corrupted RDB or DUMP payload,
but not exploited through COPY (which did not exist before 6.2).
References
Copyright © 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright
information.