Vulnerability Name: CVE-2021-32627 (CCN-210724) Assigned: 2021-10-04 Published: 2021-10-04 Updated: 2022-10-06 Summary: Redis is an open source, in-memory database that persists on disk. In affected versions an integer overflow bug in Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default proto-max-bulk-len and client-query-buffer-limit configuration parameters to very large values and constructing specially crafted very large stream elements. The problem is fixed in Redis 6.2.6, 6.0.16 and 5.0.14. For users unable to upgrade an additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the proto-max-bulk-len configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command. CVSS v3 Severity: 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H )6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H )6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
7.5 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H )6.5 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.1 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-190 CWE-680 CWE-787) CWE-787) CWE-787) Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2021-32627 Source: XF Type: UNKNOWNredis-cve202132627-integer-overflow(210724) Source: MISC Type: Patch, Third Party Advisoryhttps://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3 Source: CCN Type: Redis GIT RepositoryInteger overflow issue with Streams Source: CONFIRM Type: Third Party Advisoryhttps://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v Source: FEDORA Type: Mailing List, Third Party AdvisoryFEDORA-2021-61c487f241 Source: FEDORA Type: Mailing List, Third Party AdvisoryFEDORA-2021-8913c7900c Source: FEDORA Type: Mailing List, Third Party AdvisoryFEDORA-2021-aa94492a09 Source: GENTOO Type: Third Party AdvisoryGLSA-202209-17 Source: CONFIRM Type: Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20211104-0003/ Source: DEBIAN Type: Third Party AdvisoryDSA-5001 Source: CCN Type: IBM Security Bulletin 6523748 (Event Streams)Multiple vulnerabilities in Redis affecting the IBM Event Streams UI Source: CCN Type: IBM Security Bulletin 6524682 (Spectrum Protect Plus)Vulnerabilities in Redis, OpenSSH, Golang Go, and Apache Kafka may affect IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and OpenShift Source: CCN Type: IBM Security Bulletin 6597535 (Watson Knowledge Catalog on-prem)Mutiple Vulnerabilities in Redis affecting Watson Knowledge Catalog for IBM Cloud Pak for Data Source: CCN Type: IBM Security Bulletin 6825987 (Robotic Process Automation)Multiple security vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak Source: CCN Type: IBM Security Bulletin 7006571 (Robotic Process Automation for Cloud Pak)Multiple vulnerabilities in Redis may affect IBM Robotic Process Automation for Cloud Pak Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuapr2022.html Vulnerable Configuration: Configuration 1 :cpe:/a:redis:redis:*:*:*:*:*:*:*:* (Version >= 6.2.0 and < 6.2.6)OR cpe:/a:redis:redis:*:*:*:*:*:*:*:* (Version >= 6.0.0 and < 6.0.16) OR cpe:/a:redis:redis:*:*:*:*:*:*:*:* (Version >= 5.0.0 and < 5.0.14) Configuration 2 :cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:* OR cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:* OR cpe:/o:fedoraproject:fedora:35:*:*:*:*:*:*:* Configuration 3 :cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:11.0:*:*:*:*:*:*:* Configuration 4 :cpe:/a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:* OR cpe:/a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:* Configuration 5 :cpe:/a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration CCN 1 :cpe:/a:redislabs:redis:*:*:*:*:*:*:*:* AND cpe:/a:ibm:spectrum_protect_plus:10.1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:2019.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect_plus:10.1.6:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:2019.4.2:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:2019.4.3:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect_plus:10.1.7:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect_plus:10.1.8:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:robotic_process_automation:21.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:robotic_process_automation:21.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:robotic_process_automation:21.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:robotic_process_automation:21.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.1:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
redis redis *
redis redis *
redis redis *
fedoraproject fedora 33
fedoraproject fedora 34
fedoraproject fedora 35
debian debian linux 10.0
debian debian linux 11.0
netapp management services for element software -
netapp management services for netapp hci -
oracle communications operations monitor 4.3
oracle communications operations monitor 4.4
oracle communications operations monitor 5.0
redislabs redis *
ibm spectrum protect plus 10.1.5
ibm event streams 2019.4.1
ibm spectrum protect plus 10.1.6
ibm event streams 2019.4.2
ibm event streams 10.0.0
ibm event streams 2019.4.3
ibm event streams 10.1.0
ibm spectrum protect plus 10.1.7
ibm event streams 10.2.0
ibm spectrum protect plus 10.1.8
ibm event streams 10.3.0
ibm event streams 10.3.1
ibm robotic process automation 21.0.0
ibm robotic process automation 21.0.1
ibm robotic process automation 21.0.2
ibm robotic process automation 21.0.3
ibm robotic process automation for cloud pak 21.0.1