Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-21309
HistoryFeb 26, 2021 - 12:00 a.m.

CVE-2021-21309

2021-02-2600:00:00
ubuntu.com
ubuntu.com
13

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

77.6%

Redis is an open-source, in-memory database that persists on disk. In
affected versions of Redis an integer overflow bug in 32-bit Redis version
4.0 or newer could be exploited to corrupt the heap and potentially result
with remote code execution. Redis 4.0 or newer uses a configurable limit
for the maximum supported bulk input size. By default, it is 512MB which is
a safe value for all platforms. If the limit is significantly increased,
receiving a large request from a client may trigger several integer
overflow scenarios, which would result with buffer overflow and heap
corruption. We believe this could in certain conditions be exploited for
remote code execution. By default, authenticated Redis users have access to
all configuration parameters and can therefore use the β€œCONFIG SET
proto-max-bulk-len” to change the safe default, making the system
vulnerable. This problem only affects 32-bit Redis (on a 32-bit system,
or as a 32-bit executable running on a 64-bit system).
The problem is
fixed in version 6.2, and the fix is back ported to 6.0.11 and 5.0.11. Make
sure you use one of these versions if you are running 32-bit Redis. An
additional workaround to mitigate the problem without patching the
redis-server executable is to prevent clients from directly executing
CONFIG SET: Using Redis 6.0 or newer, ACL configuration can be used to
block the command. Using older versions, the rename-command configuration
directive can be used to rename the command to a random string unknown to
users, rendering it inaccessible. Please note that this workaround may have
an additional impact on users or operational systems that expect CONFIG SET to behave in certain ways.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchredis<Β 5:4.0.9-1ubuntu0.2+esm3UNKNOWN
ubuntu21.04noarchredis<Β 5:6.0.11-1UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

77.6%