CVE-2023-25155Integer Overflow or Wraparound in Redis

Severity
6.5MEDIUMNVD
OSV8.8
EPSS
3.1%
top 13.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 2
Latest updateFeb 15

Description

Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages7 packages

NVDredis/redis6.2.06.2.11+2
debiandebian/redis< redis 5:7.0.9-1 (bookworm)
Debianredis/redis< 5:6.0.16-1+deb11u3+3
Ubunturedis/redis< 2:2.8.4-2ubuntu0.2+esm3+4
CVEListV5redis/redis>= 6.2.0, < 6.2.11, >= 7.0.0, < 7.0.9+1

Patches

🔴Vulnerability Details

2
OSV
redis vulnerabilities2023-12-05
OSV
CVE-2023-25155: Redis is an in-memory database that persists on disk2023-03-02

📋Vendor Advisories

5
CISA ICS
Siemens SCALANCE XCM-/XRM-3002024-02-15
Ubuntu
Redis vulnerabilities2023-12-05
Microsoft
Integer Overflow in several Redis commands can lead to denial of service.2023-03-14
Red Hat
redis: String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack2023-02-28
Debian
CVE-2023-25155: redis - Redis is an in-memory database that persists on disk. Authenticated users issuin...2023