CVE-2021-32672 — Out-of-bounds Read in Redis
Severity
4.3MEDIUMNVD
CNA5.3
EPSS
0.3%
top 47.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 4
Latest updateAug 3
Description
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4
Affected Packages4 packages
Also affects: Debian Linux 10.0, 11.0, Fedora 33, 34, 35, Enterprise Linux 8.0