Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-32675
HistoryOct 04, 2021 - 12:00 a.m.

CVE-2021-32675

2021-10-0400:00:00
ubuntu.com
ubuntu.com
11

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

73.8%

Redis is an open source, in-memory database that persists on disk. When
parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates
memory according to user-specified values which determine the number of
elements (in the multi-bulk header) and size of each element (in the bulk
header). An attacker delivering specially crafted requests over multiple
connections can cause the server to allocate significant amount of memory.
Because the same parsing mechanism is used to handle authentication
requests, this vulnerability can also be exploited by unauthenticated
users. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An
additional workaround to mitigate this problem without patching the
redis-server executable is to block access to prevent unauthenticated users
from connecting to Redis. This can be done in different ways: Using network
access control tools like firewalls, iptables, security groups, etc. or
Enabling TLS and requiring users to authenticate using client side
certificates.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchredis< 5:4.0.9-1ubuntu0.2+esm3UNKNOWN
ubuntu20.04noarchredis< 5:5.0.7-2ubuntu0.1+esm1UNKNOWN
ubuntu14.04noarchredis< 2:2.8.4-2ubuntu0.2+esm2) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchredis< 2:3.0.6-1ubuntu0.4+esm1UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

73.8%