Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian LTS: Security Advisory for redis (DLA-2810-1)

Information

Severity

Severity

Critical

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

9.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

2 years ago

Modified

Modified

2 years ago

Summary

The remote host is missing an update for the 'redis' package(s) announced via the DLA-2810-1 advisory.

Insight

Insight

It was discovered that there were a number of issues in redis, a popular key-value database system: * CVE-2021-41099: Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value. * CVE-2021-32762: Integer to heap buffer overflow issue in redis-cli and redis-sentinel parsing large multi-bulk replies on some older and less common platforms. * CVE-2021-32687: Integer to heap buffer overflow with intsets, when set-max-intset-entries is manually configured to a non-default, very large value. * CVE-2021-32675: Denial Of Service when processing RESP request payloads with a large number of elements on many connections. * CVE-2021-32672: Random heap reading issue with Lua Debugger. * CVE-2021-32626: Specially crafted Lua scripts may result with Heap buffer overflow.

Affected Software

Affected Software

'redis' package(s) on Debian Linux.

Detection Method

Detection Method

Checks if a vulnerable package version is present on the target host.

Solution

Solution

For Debian 9 'Stretch', this problem has been fixed in version 3:3.2.6-3+deb9u8. We recommend that you upgrade your redis packages.