logo
DATABASE RESOURCES PRICING ABOUT US

Security Bulletin: Multiple vulnerabilities in Redis may affect IBM Robotic Process Automation for Cloud Pak

Description

## Summary Redis is used by IBM Robotic Process Automation for Cloud Pak as a performance accelerator for the IBM Robotic Process Automation server ## Vulnerability Details ** CVEID: **[CVE-2021-21309](<https://exchange.xforce.ibmcloud.com/vulnerabilities/197573>) ** DESCRIPTION: **Redis could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an integer overflow. By sending an overly long request, an attacker could overflow a buffer and execute arbitrary code on the system or cause the system to crash. CVSS Base score: 8.8 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/197573](<https://exchange.xforce.ibmcloud.com/vulnerabilities/197573>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) ** CVEID: **[CVE-2021-29477](<https://exchange.xforce.ibmcloud.com/vulnerabilities/201176>) ** DESCRIPTION: **Redis could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an integer overflow in the STRALGO LCS command. By sending a specially crafted request, an attacker could overflow a buffer and execute arbitrary code on the system. CVSS Base score: 7.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/201176](<https://exchange.xforce.ibmcloud.com/vulnerabilities/201176>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) ** CVEID: **[CVE-2021-29478](<https://exchange.xforce.ibmcloud.com/vulnerabilities/201174>) ** DESCRIPTION: **Redis could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an integer overflow in COPY command for large intsets. By sending a specially crafted request, an attacker could overflow a buffer and execute arbitrary code on the system. CVSS Base score: 7.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/201174](<https://exchange.xforce.ibmcloud.com/vulnerabilities/201174>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) ** CVEID: **[CVE-2021-32625](<https://exchange.xforce.ibmcloud.com/vulnerabilities/203016>) ** DESCRIPTION: **Redis could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an integer overflow bug. By using a specially-crafted `STRALGO LCS` command, an attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base score: 8.8 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/203016](<https://exchange.xforce.ibmcloud.com/vulnerabilities/203016>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) ** CVEID: **[CVE-2021-32626](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210723>) ** DESCRIPTION: **Redis is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. By executing specially-crafted Lua scripts, a remote authenticated attacker could overflow a buffer and execute arbitrary code on the system. CVSS Base score: 7.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/210723](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210723>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) ** CVEID: **[CVE-2021-32627](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210724>) ** DESCRIPTION: **Redis could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an integer overflow with Streams. By sending a specially-crafted request using the proto-max-bulk-len and client-query-buffer-limit configuration parameters, an attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base score: 7.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/210724](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210724>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) ** CVEID: **[CVE-2021-32628](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210725>) ** DESCRIPTION: **Redis could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an integer overflow in the handling of large ziplists. By sending a specially-crafted request using the ziplist configuration parameters, an attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base score: 7.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/210725](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210725>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) ** CVEID: **[CVE-2021-32672](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210726>) ** DESCRIPTION: **Redis could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw in the Lua Debugger. By sending specially-crafted requests, an attacker could exploit this vulnerability to read data beyond the actual buffer, and use this information to launch further attacks against the affected system. CVSS Base score: 3.1 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/210726](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210726>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N) ** CVEID: **[CVE-2021-32675](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210727>) ** DESCRIPTION: **Redis is vulnerable to a denial of service, caused by improper input validation. By sending specially-crafted Redis Standard Protocol (RESP) requests, a remote attacker could exploit this vulnerability to allocate significant amount of memory. CVSS Base score: 7.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/210727](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210727>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) ** CVEID: **[CVE-2021-32687](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210728>) ** DESCRIPTION: **Redis could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an integer overflow with intsets. By sending a specially-crafted request using the intsets, an attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base score: 7.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/210728](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210728>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) ** CVEID: **[CVE-2021-32761](<https://exchange.xforce.ibmcloud.com/vulnerabilities/206313>) ** DESCRIPTION: **Redis could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an integer overflow in the "*BIT*" command . By using a specially-crafted "proto-max-bulk-len" configuration parameter and commands bit commands, an attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base score: 7.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/206313](<https://exchange.xforce.ibmcloud.com/vulnerabilities/206313>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) ** CVEID: **[CVE-2021-32762](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210729>) ** DESCRIPTION: **Redis could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an integer overflow in the redis-cli command line tool and redis-sentinel service. By parsing specially-crafted large multi-bulk network replies, an attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base score: 7.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/210729](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210729>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) ** CVEID: **[CVE-2021-41099](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210649>) ** DESCRIPTION: **Redis is vulnerable to an heap-based buffer overflow, caused by improper bounds checking in the underlying string library. By sending a specially-crafted request, a remote authenticated attacker could overflow a buffer and execute arbitrary code on the system or cause a denial of service. CVSS Base score: 7.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/210649](<https://exchange.xforce.ibmcloud.com/vulnerabilities/210649>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) ## Affected Products and Versions Affected Product(s)| Version(s) ---|--- IBM Robotic Process Automation for Cloud Pak| 21.0.1-21.0.7.5, 23.0.0 - 23.0.6 ## Remediation/Fixes **IBM strongly recommends addressing the vulnerability now.** **Product(s)**| **Version(s) number and/or range **| **Remediation/Fix/Instructions** ---|---|--- IBM Robotic Process Automation for Cloud Pak| 21.0.1 - 21.0.7.5| Update to 21.0.7.6 or higher using the following [instructions](<https://www.ibm.com/docs/en/rpa/21.0?topic=upgrading-rpa-openshift-container-platform> "" ). IBM Robotic Process Automation for Cloud Pak| 23.0.0 - 23.0.6| Update to 23.0.7 or higher using the following [instructions](<https://www.ibm.com/docs/en/rpa/23.0?topic=upgrading-rpa-openshift-container-platform> "" ). ## Workarounds and Mitigations None. ##


Affected Software


CPE Name Name Version
ibm robotic process automation 21.0.0
ibm robotic process automation 21.0.7.5
ibm robotic process automation 23.0.0
ibm robotic process automation 23.0.6

Related