Redislabs Redis vulnerabilities
22 known vulnerabilities affecting redislabs/redis.
Total CVEs
22
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL5HIGH13MEDIUM3LOW1
Vulnerabilities
Page 1 of 2
CVE-2020-21468HIGHCVSS 7.5v5.0.72021-09-20
CVE-2020-21468 [HIGH] CVE-2020-21468: A segmentation fault in the redis-server component of Redis 5.0.7 leads to a denial of service (DOS)
A segmentation fault in the redis-server component of Redis 5.0.7 leads to a denial of service (DOS). NOTE: the vendor cannot reproduce this issue in a released version, such as 5.0.7
nvd
CVE-2021-32761HIGHCVSS 7.5≥ 2.2.0, < 5.0.13≥ 6.0, < 6.0.15+1 more2021-07-21
CVE-2021-32761 [HIGH] CWE-125 CVE-2021-32761: Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read a
Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, l
nvd
CVE-2021-32625HIGHCVSS 8.8≥ 6.0.0, < 6.0.14≥ 6.2.0, < 6.2.42021-06-02
CVE-2021-32625 [HIGH] CVE-2021-32625: Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, a
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The proble
nvd
CVE-2021-29477HIGHCVSS 8.8≥ 6.0.0, < 6.0.13≥ 6.2.0, < 6.2.32021-05-04
CVE-2021-29477 [HIGH] CWE-190 CVE-2021-29477: Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, a
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer could be exploited using the `STRALGO LCS` command to corrupt the heap and potentially result with remote code execution. The problem is fixed in version 6.2.3 and 6.0.13. An addit
nvd
CVE-2021-29478HIGHCVSS 8.8≥ 6.2.0, < 6.2.32021-05-04
CVE-2021-29478 [HIGH] CWE-190 CVE-2021-29478: Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, a
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version
nvd
CVE-2021-3470MEDIUMCVSS 5.3fixed in 5.0.10≥ 6.0.0, < 6.0.9+1 more2021-03-31
CVE-2021-3470 [MEDIUM] CWE-119 CVE-2021-3470: A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 wh
A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.
nvd
CVE-2021-21309HIGHCVSS 8.8≥ 4.0, < 5.0.11≥ 6.0.0, < 6.0.112021-02-26
CVE-2021-21309 [MEDIUM] CWE-190 CVE-2021-21309: Redis is an open-source, in-memory database that persists on disk. In affected versions of Redis an
Redis is an open-source, in-memory database that persists on disk. In affected versions of Redis an integer overflow bug in 32-bit Redis version 4.0 or newer could be exploited to corrupt the heap and potentially result with remote code execution. Redis 4.0 or newer uses a configurable limit for the maximum supported bulk input size. By default, it i
nvd
CVE-2020-14147HIGHCVSS 7.7fixed in 5.0.9≥ 6.0.0, < 6.0.32020-06-15
CVE-2020-14147 [HIGH] CVE-2020-14147: An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-depe
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: th
nvd
CVE-2013-0178MEDIUMCVSS 5.5fixed in 2.6.02019-11-01
CVE-2013-0178 [MEDIUM] CWE-20 CVE-2013-0178: Insecure temporary file vulnerability in Redis before 2.6 related to /tmp/redis-%p.vm.
Insecure temporary file vulnerability in Redis before 2.6 related to /tmp/redis-%p.vm.
nvd
CVE-2013-0180MEDIUMCVSS 5.5v2.6.02019-11-01
CVE-2013-0180 [MEDIUM] CWE-20 CVE-2013-0180: Insecure temporary file vulnerability in Redis 2.6 related to /tmp/redis.ds.
Insecure temporary file vulnerability in Redis 2.6 related to /tmp/redis.ds.
nvd
CVE-2019-10193HIGHCVSS 7.2≥ 3.0.0, < 3.2.13≥ 4.0.0, < 4.0.14+1 more2019-07-11
CVE-2019-10193 [HIGH] CWE-121 CVE-2019-10193: A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
nvd
CVE-2019-10192HIGHCVSS 7.2≥ 3.0.0, < 3.2.13≥ 4.0.0, < 4.0.14+1 more2019-07-11
CVE-2019-10192 [HIGH] CWE-122 CVE-2019-10192: A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
nvd
CVE-2018-11219CRITICALCVSS 9.8fixed in 3.2.12≥ 4.0, < 4.0.10+1 more2018-06-17
CVE-2018-11219 [CRITICAL] CWE-190 CVE-2018-11219: An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before
An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
nvd
CVE-2018-11218CRITICALCVSS 9.8fixed in 3.2.12≥ 4.0, < 4.0.10+1 more2018-06-17
CVE-2018-11218 [CRITICAL] CWE-787 CVE-2018-11218: Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12
Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
nvd
CVE-2018-12326HIGHCVSS 8.4PoCfixed in 4.0.10v5.02018-06-17
CVE-2018-12326 [HIGH] CWE-119 CVE-2018-12326: Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to ach
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
nvd
CVE-2018-12453HIGHCVSS 7.5PoCfixed in 5.02018-06-16
CVE-2018-12453 [HIGH] CWE-704 CVE-2018-12453: Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allow
Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.
nvd
CVE-2016-10517HIGHCVSS 7.4fixed in 3.2.72017-10-24
CVE-2016-10517 [HIGH] CWE-254 CVE-2016-10517: networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for PO
networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).
nvd
CVE-2017-15047CRITICALCVSS 9.8v4.0.22017-10-06
CVE-2017-15047 [CRITICAL] CWE-119 CVE-2017-15047: The clusterLoadConfig function in cluster.c in Redis 4.0.2 allows attackers to cause a denial of ser
The clusterLoadConfig function in cluster.c in Redis 4.0.2 allows attackers to cause a denial of service (out-of-bounds array index and application crash) or possibly have unspecified other impact by leveraging "limited access to the machine."
nvd
CVE-2016-8339CRITICALCVSS 9.8v3.2.0v3.2.1+2 more2016-10-28
CVE-2016-8339 [CRITICAL] CWE-787 CVE-2016-8339: A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted comma
A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentia
nvd
CVE-2013-7458LOWCVSS 3.3≤ 3.2.22016-08-10
CVE-2013-7458 [LOW] CWE-200 CVE-2013-7458: linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, whi
linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.
nvd
1 / 2Next →