One Article Review

Accueil - L'article:
Source CVE.webp CVE Liste
Identifiant 3108755
Date de publication 2021-07-21 21:15:07 (vue: 2021-07-21 23:05:46)
Titre CVE-2021-32761
Texte Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution. The vulnerability involves changing the default `proto-max-bulk-len` configuration parameter to a very large value and constructing specially crafted commands bit commands. This problem only affects Redis on 32-bit platforms, or compiled as a 32-bit binary. Redis versions 5.0.`3m 6.0.15, and 6.2.5 contain patches for this issue. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `proto-max-bulk-len` configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.
Envoyé Oui
Condensat 2021 32761 `*bit*` `3m `proto `redis acl additional affects arbitrary are binary bit bounds buffer bulk can changing code command commands compiled config configuration constructing contain contents corrupt crafted cve database default disk done executable execution exists exploited from heap integer involves involving issue large leak len` max memory mitigate modifying only out overflow parameter patches patching persists platforms potentially prevent prior problem read redis remote restrict server` set specially starting systems trigger unprivileged users using value version versions very vulnerability vulnerable without workaround
Tags Vulnerability Patching
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: