7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
redis is vulnerable to denial of service. An integer overflow in the getnum
function in lua_struct.c
allows an attacker to crash the application.
CPE | Name | Operator | Version |
---|---|---|---|
redis:edge | eq | 5.0.8-r0 | |
redis:edge | eq | 6.0.1-r0 | |
redis:edge | eq | 5.0.7-r0 | |
redis:edge | eq | 5.0.9-r0 |
lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html
github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571
github.com/antirez/redis/pull/6875
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.13/main.yaml
security.gentoo.org/glsa/202008-17
www.debian.org/security/2020/dsa-4731
www.oracle.com/security-alerts/cpujan2021.html
7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P