CVE-2021-32628 - log back

CVE-2021-32628 edited at 04 Oct 2021 20:29:01
Severity
- Unknown
+ High
Remote
- Unknown
+ Remote
Type
- Unknown
+ Arbitrary code execution
CVE-2021-32628 edited at 04 Oct 2021 20:28:44
Description
+ An integer overflow bug in the ziplist data structure used by all versions of Redis can be exploited to corrupt the heap and potentially result with remote code execution.
+
+ The vulnerability involves modifying the default ziplist configuration parameters (hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value) to a very large value, and then constructing specially crafted commands to create very large ziplists.
+
+ The problem is fixed in Redis versions 6.2.6, 6.0.16, 5.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the above configuration parameters. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.
References
+ https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr
+ https://github.com/redis/redis/commit/2775a3526e3e8bb040e72995231632c801977395
CVE-2021-32628 created at 04 Oct 2021 20:24:14
Severity
+ Unknown
Remote
+ Unknown
Type
+ Unknown
Description
References
Notes