CVE-2021-32762Integer Overflow or Wraparound in Redis

Severity
8.8HIGHNVD
CNA7.5
EPSS
0.7%
top 28.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4
Latest updateOct 12

Description

Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc() heap allocation function. This issue only impacts systems with heap allocators that do not perform their own overflow checks. Most m

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5redis/redis< 5.0.14+2
NVDredis/redis5.0.05.0.14+2
Debianredis/redis< 5:6.0.16-1+deb11u1+3

Also affects: Debian Linux 10.0, 11.0, Fedora 33, 34, 35

Patches

🔴Vulnerability Details

2
OSV
CVE-2021-32762: Redis is an open source, in-memory database that persists on disk2021-10-04
CVEList
Integer overflow that can lead to heap overflow in redis-cli, redis-sentinel on some platforms2021-10-04

📋Vendor Advisories

3
Microsoft
Integer overflow that can lead to heap overflow in redis-cli redis-sentinel on some platforms2021-10-12
Red Hat
redis: Integer overflow in redis-cli, redis-sentinel on some platforms2021-10-04
Debian
CVE-2021-32762: redis - Redis is an open source, in-memory database that persists on disk. The redis-cli...2021
CVE-2021-32762 — Integer Overflow or Wraparound | cvebase