CVE-2021-32687Integer Overflow or Wraparound in Redis

Severity
7.5HIGHNVD
EPSS
0.7%
top 28.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4
Latest updateAug 3

Description

Redis is an open source, in-memory database that persists on disk. An integer overflow bug affecting all versions of Redis can be exploited to corrupt the heap and potentially be used to leak arbitrary contents of the heap or trigger remote code execution. The vulnerability involves changing the default set-max-intset-entries configuration parameter to a very large value and constructing specially crafted commands to manipulate sets. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.1

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages4 packages

CVEListV5redis/redis< 5.0.14+2
NVDredis/redis5.0.05.0.14+2
Debianredis/redis< 5:6.0.16-1+deb11u1+3

Also affects: Debian Linux 10.0, 11.0, Fedora 33, 34, 35

Patches

🔴Vulnerability Details

2
CVEList
Integer overflow issue with intsets in Redis2021-10-04
OSV
CVE-2021-32687: Redis is an open source, in-memory database that persists on disk2021-10-04

📋Vendor Advisories

4
Ubuntu
Redis vulnerabilities2022-08-03
Microsoft
Integer overflow issue with intsets in Redis2021-10-12
Red Hat
redis: Integer overflow issue with intsets2021-10-04
Debian
CVE-2021-32687: redis - Redis is an open source, in-memory database that persists on disk. An integer ov...2021
CVE-2021-32687 — Integer Overflow or Wraparound | cvebase