Vulnerability Name: | CVE-2022-31144 (CCN-231967) | ||||||||||||
Assigned: | 2022-07-18 | ||||||||||||
Published: | 2022-07-18 | ||||||||||||
Updated: | 2022-10-07 | ||||||||||||
Summary: | Redis is an in-memory database that persists on disk. A specially crafted `XAUTOCLAIM` command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is released in version 7.0.4. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.0 Medium (CCN CVSS v2 Vector: AV:L/AC:H/Au:S/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-122 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-31144 Source: XF Type: UNKNOWN redis-cve202231144-bo(231967) Source: MISC Type: Release Notes, Third Party Advisory https://github.com/redis/redis/releases/tag/7.0.4 Source: CCN Type: Redis GIT Repository Potential heap overflow in Redis 7.0 XAUTOCLAIM command Source: CONFIRM Type: Third Party Advisory https://github.com/redis/redis/security/advisories/GHSA-96f7-42fg-2jrh Source: GENTOO Type: Third Party Advisory GLSA-202209-17 Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20220909-0002/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |