5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
7 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
50.5%
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted SRANDMEMBER
, ZRANDMEMBER
, and HRANDFIELD
commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.
[
{
"vendor": "redis",
"product": "redis",
"versions": [
{
"version": "< 6.0.18",
"status": "affected"
},
{
"version": ">= 7.0.0, < 7.0.9",
"status": "affected"
},
{
"version": ">= 6.2.0, < 6.2.11",
"status": "affected"
}
]
}
]
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
7 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
50.5%