Denial-of-Service Vulnerability in Redis In-Memory Database
CVE-2024-31228

5.5MEDIUM

Key Information:

Vendor

Redis

Status
Vendor
CVE Published:
7 October 2024

What is CVE-2024-31228?

Redis, an open-source in-memory database, is susceptible to a denial-of-service attack where authenticated users can exploit specially crafted long string match patterns. This can affect commands like KEYS, SCAN, PSUBSCRIBE, and ACL definitions, leading to unbounded recursion. Such exploitation may cause a stack overflow, resulting in a crash of the Redis process. Users are strongly encouraged to upgrade to the fixed versions—6.2.16, 7.2.6, or 7.4.1—since there are no known workarounds available.

Affected Version(s)

redis >= 2.2.5, < 6.2.16 < 2.2.5, 6.2.16

redis >= 7.0.0, < 7.2.6 < 7.0.0, 7.2.6

redis >= 7.3.0, < 7.4.1 < 7.3.0, 7.4.1

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.