CVE-2021-32627 - log back

CVE-2021-32627 edited at 04 Oct 2021 20:27:49
Severity
- Unknown
+ High
Remote
- Unknown
+ Remote
Type
- Unknown
+ Arbitrary code execution
CVE-2021-32627 edited at 04 Oct 2021 20:27:27
Description
+ An integer overflow bug in Redis 5.0 or newer can be exploited to corrupt the heap and potentially result with remote code execution.
+
+ The vulnerability involves changing the default proto-max-bulk-len and client-query-buffer-limit configuration parameters to very large values and constructing specially crafted very large stream elements.
+
+ The problem is fixed in Redis 6.2.6, 6.0.16 and 5.0.14. For users unable to upgrade an additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the proto-max-bulk-len configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.
References
+ https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v
+ https://github.com/redis/redis/commit/2775a3526e3e8bb040e72995231632c801977395
CVE-2021-32627 created at 04 Oct 2021 20:24:14
Severity
+ Unknown
Remote
+ Unknown
Type
+ Unknown
Description
References
Notes