Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-29478
HistoryMay 04, 2021 - 12:00 a.m.

CVE-2021-29478

2021-05-0400:00:00
ubuntu.com
ubuntu.com
11

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

76.3%

Redis is an open source (BSD licensed), in-memory data structure store,
used as a database, cache, and message broker. An integer overflow bug in
Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and
potentially result with remote code execution. Redis 6.0 and earlier are
not directly affected by this issue. The problem is fixed in version 6.2.3.
An additional workaround to mitigate the problem without patching the
redis-server executable is to prevent users from modifying the
set-max-intset-entries configuration parameter. This can be done using
ACL to restrict unprivileged users from using the CONFIG SET command.

Bugs

Notes

Author Note
ebarretto Redis 6.0 and earlier are not directly affected by this issue.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

76.3%