Vulnerability Name: | CVE-2021-32687 (CCN-210728) |
Assigned: | 2021-10-04 |
Published: | 2021-10-04 |
Updated: | 2022-10-06 |
Summary: | Redis is an open source, in-memory database that persists on disk. An integer overflow bug affecting all versions of Redis can be exploited to corrupt the heap and potentially be used to leak arbitrary contents of the heap or trigger remote code execution. The vulnerability involves changing the default set-max-intset-entries configuration parameter to a very large value and constructing specially crafted commands to manipulate sets. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the set-max-intset-entries configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command. |
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 7.5 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.5 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): Single_Instance | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.1 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-190 CWE-680 CWE-787) CWE-787) CWE-787)
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2021-32687
Source: XF Type: UNKNOWN redis-cve202132687-integer-overflow(210728)
Source: MISC Type: Patch, Third Party Advisory https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f
Source: CCN Type: Redis GIT Repository Integer overflow issue with intsets
Source: CONFIRM Type: Third Party Advisory https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-61c487f241
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-8913c7900c
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-aa94492a09
Source: GENTOO Type: Third Party Advisory GLSA-202209-17
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20211104-0003/
Source: DEBIAN Type: Third Party Advisory DSA-5001
Source: CCN Type: IBM Security Bulletin 6523748 (Event Streams) Multiple vulnerabilities in Redis affecting the IBM Event Streams UI
Source: CCN Type: IBM Security Bulletin 6524682 (Spectrum Protect Plus) Vulnerabilities in Redis, OpenSSH, Golang Go, and Apache Kafka may affect IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and OpenShift
Source: CCN Type: IBM Security Bulletin 6597535 (Watson Knowledge Catalog on-prem) Mutiple Vulnerabilities in Redis affecting Watson Knowledge Catalog for IBM Cloud Pak for Data
Source: CCN Type: IBM Security Bulletin 6825987 (Robotic Process Automation) Multiple security vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak
Source: CCN Type: IBM Security Bulletin 7006571 (Robotic Process Automation for Cloud Pak) Multiple vulnerabilities in Redis may affect IBM Robotic Process Automation for Cloud Pak
Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuapr2022.html
|
Vulnerable Configuration: | Configuration 1: cpe:/a:redis:redis:*:*:*:*:*:*:*:* (Version >= 6.2.0 and < 6.2.6)OR cpe:/a:redis:redis:*:*:*:*:*:*:*:* (Version >= 6.0.0 and < 6.0.16)OR cpe:/a:redis:redis:*:*:*:*:*:*:*:* (Version >= 5.0.0 and < 5.0.14) Configuration 2: cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:35:*:*:*:*:*:*:* Configuration 3: cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*OR cpe:/o:debian:debian_linux:11.0:*:*:*:*:*:*:* Configuration 4: cpe:/a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*OR cpe:/a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:* Configuration 5: cpe:/a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*OR cpe:/a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*OR cpe:/a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:redislabs:redis:*:*:*:*:*:*:*:*AND cpe:/a:ibm:spectrum_protect_plus:10.1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:2019.4.1:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.6:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:2019.4.2:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:2019.4.3:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.7:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.2.0:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.8:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation:21.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation:21.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation:21.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation:21.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.1:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
redis redis *
redis redis *
redis redis *
fedoraproject fedora 33
fedoraproject fedora 34
fedoraproject fedora 35
debian debian linux 10.0
debian debian linux 11.0
netapp management services for element software -
netapp management services for netapp hci -
oracle communications operations monitor 4.3
oracle communications operations monitor 4.4
oracle communications operations monitor 5.0
redislabs redis *
ibm spectrum protect plus 10.1.5
ibm event streams 2019.4.1
ibm spectrum protect plus 10.1.6
ibm event streams 2019.4.2
ibm event streams 10.0.0
ibm event streams 2019.4.3
ibm event streams 10.1.0
ibm spectrum protect plus 10.1.7
ibm event streams 10.2.0
ibm spectrum protect plus 10.1.8
ibm event streams 10.3.0
ibm event streams 10.3.1
ibm robotic process automation 21.0.0
ibm robotic process automation 21.0.1
ibm robotic process automation 21.0.2
ibm robotic process automation 21.0.3
ibm robotic process automation for cloud pak 21.0.1