Vulnerability Name: | CVE-2022-24736 (CCN-225345) |
Assigned: | 2022-04-27 |
Published: | 2022-04-27 |
Updated: | 2022-10-07 |
Summary: | Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules. |
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) 3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low | 3.3 Low (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) 2.9 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial |
|
Vulnerability Type: | CWE-476
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2022-24736
Source: XF Type: UNKNOWN redis-cve202224736-dos(225345)
Source: MISC Type: Exploit, Third Party Advisory https://github.com/redis/redis/pull/10651
Source: MISC Type: Release Notes, Third Party Advisory https://github.com/redis/redis/releases/tag/6.2.7
Source: MISC Type: Release Notes, Third Party Advisory https://github.com/redis/redis/releases/tag/7.0.0
Source: CCN Type: Redis GIT Repository A Malformed Lua script can crash Redis
Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/redis/redis/security/advisories/GHSA-3qpw-7686-5984
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-44373f6778
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-6ed1ce2838
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-a0a4c7eb31
Source: GENTOO Type: Third Party Advisory GLSA-202209-17
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20220715-0003/
Source: CCN Type: IBM Security Bulletin 6608610 (DataPower Gateway) IBM DataPower Gateway affected by vulnerabilities in Redis
Source: CCN Type: IBM Security Bulletin 6825545 (Event Streams) Vulnerabilities in Redis affect IBM Event Streams (CVE-2022-24736, CVE-2022-24735)
Source: CCN Type: IBM Security Bulletin 6842235 (Spectrum Protect Plus) Vulnerabilities in Redis affect IBM Spectrum Protect Plus Container backup and restore for Kubernetes and OpenShift (CVE-2022-24736, CVE-2022-24735)
Source: CCN Type: IBM Security Bulletin 6999327 (Qradar Advisor) IBM QRadar Advisor With Watson App for IBM QRadar SIEM is vulnerable to using components with known vulnerabilities
Source: CCN Type: Mend Vulnerability Database CVE-2022-24736
Source: N/A Type: Patch, Third Party Advisory N/A
|
Vulnerable Configuration: | Configuration 1: cpe:/a:redis:redis:7.0:rc2:*:*:*:*:*:*OR cpe:/a:redis:redis:7.0:rc3:*:*:*:*:*:*OR cpe:/a:redis:redis:7.0:rc1:*:*:*:*:*:*OR cpe:/a:redis:redis:*:*:*:*:*:*:*:* (Version < 6.2.7) Configuration 2: cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:35:*:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:36:*:*:*:*:*:*:* Configuration 3: cpe:/a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*OR cpe:/a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:* Configuration 4: cpe:/a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*OR cpe:/a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*OR cpe:/a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration RedHat 3: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 4: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:redislabs:redis:6.2.5:*:*:*:*:*:*:*OR cpe:/a:redislabs:redis:6.0.15:*:*:*:*:*:*:*OR cpe:/a:redislabs:redis:5.0.13:*:*:*:*:*:*:*OR cpe:/a:redislabs:redis:6.2.6:*:*:*:*:*:*:*OR cpe:/a:redislabs:redis:6.0.16:*:*:*:*:*:*:*OR cpe:/a:redislabs:redis:5.0.14:*:*:*:*:*:*:*AND cpe:/a:ibm:datapower_gateway:2018.4.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:datapower_gateway:10.0.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.7:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.2.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:*OR cpe:/a:ibm:datapower_gateway:10.0.4.0:*:*:*:*:*:*:*OR cpe:/a:ibm:datapower_gateway:10.5.0.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
redis redis 7.0 rc2
redis redis 7.0 rc3
redis redis 7.0 rc1
redis redis *
fedoraproject fedora 34
fedoraproject fedora 35
fedoraproject fedora 36
netapp management services for element software -
netapp management services for netapp hci -
oracle communications operations monitor 4.3
oracle communications operations monitor 4.4
oracle communications operations monitor 5.0
redislabs redis 6.2.5
redislabs redis 6.0.15
redislabs redis 5.0.13
redislabs redis 6.2.6
redislabs redis 6.0.16
redislabs redis 5.0.14
ibm datapower gateway 2018.4.1.0
ibm spectrum protect plus 10.1.5
ibm event streams 10.0.0
ibm event streams 10.1.0
ibm datapower gateway 10.0.1.0
ibm spectrum protect plus 10.1.7
ibm event streams 10.2.0
ibm event streams 10.3.0
ibm event streams 10.3.1
ibm datapower gateway 10.0.4.0
ibm datapower gateway 10.5.0.0