CVE-2022-31144Heap-based Buffer Overflow in Redis

Severity
8.8HIGHNVD
EPSS
21.2%
top 4.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 19

Description

Redis is an in-memory database that persists on disk. A specially crafted `XAUTOCLAIM` command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is released in version 7.0.4.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

NVDredis/redis7.07.0.4
debiandebian/redis< redis 5:7.0.4-1 (bookworm)
Debianredis/redis< 5:7.0.4-1+2
CVEListV5redis/redis>= 7.0.0, < 7.0.4

🔴Vulnerability Details

1
OSV
CVE-2022-31144: Redis is an in-memory database that persists on disk2022-07-19

📋Vendor Advisories

3
Red Hat
redis: heap overflow via XAUTOCLAIM command2022-07-19
Microsoft
Potential heap overflow in Redis2022-07-12
Debian
CVE-2022-31144: redis - Redis is an in-memory database that persists on disk. A specially crafted `XAUTO...2022
CVE-2022-31144 — Heap-based Buffer Overflow in Redis | cvebase