CVE-2021-32675Allocation of Resources Without Limits or Throttling in Redis

Severity
7.5HIGHNVD
EPSS
1.7%
top 17.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4
Latest updateAug 3

Description

Redis is an open source, in-memory database that persists on disk. When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). An attacker delivering specially crafted requests over multiple connections can cause the server to allocate significant amount of memory. Because the same parsing mechanism is used to handle authe

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5redis/redis< 5.0.14+2
NVDredis/redis5.0.05.0.14+2
Debianredis/redis< 5:6.0.16-1+deb11u1+3

Also affects: Debian Linux 10.0, 11.0, Fedora 33, 34, 35

Patches

🔴Vulnerability Details

3
OSV
redis vulnerabilities2022-08-03
CVEList
DoS vulnerability in Redis2021-10-04
OSV
CVE-2021-32675: Redis is an open source, in-memory database that persists on disk2021-10-04

📋Vendor Advisories

4
Ubuntu
Redis vulnerabilities2022-08-03
Microsoft
DoS vulnerability in Redis2021-10-12
Red Hat
redis: Denial of service via Redis Standard Protocol (RESP) request2021-10-04
Debian
CVE-2021-32675: redis - Redis is an open source, in-memory database that persists on disk. When parsing ...2021