6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
52.8%
redis is vulnerable to Improper Input Validation. The vulnerability allows the ‘HINCRBYFLOAT’ command to be used by authenticated users which creates an invalid hash fish which crashes redis.
CPE | Name | Operator | Version |
---|---|---|---|
redis:sid | eq | 5:6.0.15-1 | |
redis:sid | eq | 5:6.0.9-1 | |
redis:sid | eq | 5:6.0.15-1 | |
redis:sid | eq | 5:6.0.9-1 | |
redis:buster | eq | 5:5.0.3-4+deb10u3 | |
redis:buster | eq | 5:5.0.3-4+deb10u2 |
github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c
github.com/redis/redis/pull/11149
github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6
lists.debian.org/debian-lts-announce/2023/04/msg00023.html
lists.fedoraproject.org/archives/list/[email protected]/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/
lists.fedoraproject.org/archives/list/[email protected]/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/
lists.fedoraproject.org/archives/list/[email protected]/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/
security-tracker.debian.org/tracker/CVE-2023-28856
security.netapp.com/advisory/ntap-20230601-0007/
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
52.8%