Redislabs

Redis

22 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 34.53%
  • Veröffentlicht 11.07.2019 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:37

A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perfo...

  • EPSS 22.48%
  • Veröffentlicht 11.07.2019 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:37

A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis...

Exploit
  • EPSS 3.48%
  • Veröffentlicht 17.06.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:55

An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.

Exploit
  • EPSS 18.92%
  • Veröffentlicht 17.06.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:55

Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.

Exploit
  • EPSS 28.11%
  • Veröffentlicht 17.06.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:59

Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which...

Exploit
  • EPSS 31.96%
  • Veröffentlicht 16.06.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:14

Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.

  • EPSS 0.29%
  • Veröffentlicht 24.10.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).

  • EPSS 0.37%
  • Veröffentlicht 06.10.2017 04:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The clusterLoadConfig function in cluster.c in Redis 4.0.2 allows attackers to cause a denial of service (out-of-bounds array index and application crash) or possibly have unspecified other impact by leveraging "limited access to the machine."

Exploit
  • EPSS 2.49%
  • Veröffentlicht 28.10.2016 14:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the...

  • EPSS 0.03%
  • Veröffentlicht 10.08.2016 14:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.