CVE-2022-35977Integer Overflow or Wraparound in Redis

Severity
5.5MEDIUMNVD
OSV8.8
EPSS
35.6%
top 2.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 20
Latest updateDec 5

Description

Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. The problem is fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

CVEListV5redis/redis< 6.0.17+2
NVDredis/redis6.0.06.0.17+2
debiandebian/redis< redis 5:7.0.8-1 (bookworm)
Debianredis/redis< 5:6.0.16-1+deb11u4+3
Ubunturedis/redis< 2:2.8.4-2ubuntu0.2+esm3+4

Patches

🔴Vulnerability Details

2
OSV
redis vulnerabilities2023-12-05
OSV
CVE-2022-35977: Redis is an in-memory database that persists on disk2023-01-20

📋Vendor Advisories

4
Ubuntu
Redis vulnerabilities2023-12-05
Red Hat
redis: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands may result with false OOM panic2023-01-17
Microsoft
Integer overflow in certain command arguments can drive Redis to OOM panic2023-01-10
Debian
CVE-2022-35977: redis - Redis is an in-memory database that persists on disk. Authenticated users issuin...2022
CVE-2022-35977 — Integer Overflow or Wraparound | cvebase