Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Redis Server 'CONFIG SET' Command Buffer Overflow Vulnerability

Information

Severity

Severity

High

Family

Family

Databases

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

5 years ago

Modified

Modified

3 years ago

Summary

The host is installed with Redis server and is prone to buffer overflow vulnerability.

Insight

Insight

The flaw is due to an out of bounds write error existing in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store.

Affected Software

Affected Software

Redis Server 3.2.x prior to 3.2.4

Detection Method

Detection Method

Send a crafted 'CONFIG SET' command and check whether it is able to execute the command or not.

Solution

Solution

Upgrade to Redis Server 3.2.4 or later.

Common Vulnerabilities and Exposures (CVE)