Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Redis 4.0.2 and prior Buffer Overflow vulnerability

Information

Severity

Severity

High

Family

Family

Databases

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

5 years ago

Modified

Modified

4 years ago

Summary

Unchecked user input in cluster.c of redis server allows for a potential Buffer Overflow vulnerability.

Insight

Insight

The clusterLoadConfig function within /redis/src/cluster.c allows for a Buffer Overflow vulnerability leading from an array index being set from user-controllable input.

Affected Software

Affected Software

Redis Server version 4.0.2 and prior

Detection Method

Detection Method

The scripts checks if the vulnerable version is present on the host.

Solution

Solution

Update to version 4.0.3 or later.

Common Vulnerabilities and Exposures (CVE)