CVE-2021-32626 — Heap-based Buffer Overflow in Redis
Severity
8.8HIGHNVD
CNA7.5
EPSS
0.8%
top 26.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 4
Latest updateAug 3
Description
Redis is an open source, in-memory database that persists on disk. In affected versions specially crafted Lua scripts executing in Redis can cause the heap-based Lua stack to be overflowed, due to incomplete checks for this condition. This can result with heap corruption and potentially remote code execution. This problem exists in all versions of Redis with Lua scripting support, starting from 2.6. The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14. For users unable to update an addition…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages5 packages
Also affects: Debian Linux 10.0, 11.0, Fedora 33, 34, 35
Patches
🔴Vulnerability Details
3📋Vendor Advisories
5Debian▶
CVE-2021-32626: redis - Redis is an open source, in-memory database that persists on disk. In affected v...↗2021