CVE-2021-29477

CWE-190Integer Overflow6 documents5 sources
Severity
8.8HIGH
EPSS
3.5%
top 12.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 4
Latest updateJun 1

Description

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer could be exploited using the `STRALGO LCS` command to corrupt the heap and potentially result with remote code execution. The problem is fixed in version 6.2.3 and 6.0.13. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages3 packages

CVEListV5redis/redis< 6.0.14+3
NVDredislabs/redis6.0.06.0.13+1
Debianredis< 5:6.0.13-1+3

Also affects: Fedora 33, 34

🔴Vulnerability Details

2
CVEList
Vulnerability in the STRALGO LCS command2021-05-04
OSV
CVE-2021-29477: Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker2021-05-04

📋Vendor Advisories

3
Red Hat
redis: Heap corruption via `STRALGO LCS` command (Incomplete fix for CVE-2021-29477)2021-06-01
Red Hat
redis: Integer overflow via STRALGO LCS command2021-05-04
Debian
CVE-2021-29477: redis - Redis is an open source (BSD licensed), in-memory data structure store, used as ...2021