Redis subject to Integer Overflow leading to Remote Code Execution via Heap Overflow
CVE-2022-35951

7HIGH

Key Information:

Vendor
Redis
Status
Vendor
CVE Published:
23 September 2022

Summary

Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an XAUTOCLAIM command on a stream key in a specific state, with a specially crafted COUNT argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.

Affected Version(s)

redis >= 7.0.0, < 7.0.5

References

EPSS Score

80% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2022-35951 : Redis subject to Integer Overflow leading to Remote Code Execution via Heap Overflow | SecurityVulnerability.io