CVE-2021-32626Heap-based Buffer Overflow in Redis

Severity
8.8HIGHNVD
CNA7.5
EPSS
0.8%
top 26.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4
Latest updateAug 3

Description

Redis is an open source, in-memory database that persists on disk. In affected versions specially crafted Lua scripts executing in Redis can cause the heap-based Lua stack to be overflowed, due to incomplete checks for this condition. This can result with heap corruption and potentially remote code execution. This problem exists in all versions of Redis with Lua scripting support, starting from 2.6. The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14. For users unable to update an addition

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

NVDredis/redis2.65.0.14+2
Debianredis/redis< 5:6.0.16-1+deb11u1+3
Ubunturedis/redis< 2:2.8.4-2ubuntu0.2+esm2+3
CVEListV5redis/redis>= 2.6.0, < 5.0.14, >= 6.0.0, < 6.0.16, >= 6.2.0, < 6.2.6+2

Also affects: Debian Linux 10.0, 11.0, Fedora 33, 34, 35

Patches

🔴Vulnerability Details

3
OSV
redis vulnerabilities2022-08-03
CVEList
Lua scripts can overflow the heap-based Lua stack in Redis2021-10-04
OSV
CVE-2021-32626: Redis is an open source, in-memory database that persists on disk2021-10-04

📋Vendor Advisories

5
Ubuntu
Redis vulnerabilities2022-08-03
Oracle
Oracle Oracle Communications Risk Matrix: FDP (Redis) — CVE-2021-326262022-04-15
Microsoft
Lua scripts can overflow the heap-based Lua stack in Redis2021-10-12
Red Hat
redis: Lua scripts can overflow the heap-based Lua stack2021-10-04
Debian
CVE-2021-32626: redis - Redis is an open source, in-memory database that persists on disk. In affected v...2021