Denial-of-Service Vulnerability in Redis In-Memory Database
CVE-2024-31228

5.5MEDIUM

Key Information:

Vendor

Redis

Status
Vendor
CVE Published:
7 October 2024

What is CVE-2024-31228?

Redis, an open-source in-memory database, is susceptible to a denial-of-service attack where authenticated users can exploit specially crafted long string match patterns. This can affect commands like KEYS, SCAN, PSUBSCRIBE, and ACL definitions, leading to unbounded recursion. Such exploitation may cause a stack overflow, resulting in a crash of the Redis process. Users are strongly encouraged to upgrade to the fixed versions—6.2.16, 7.2.6, or 7.4.1—since there are no known workarounds available.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

redis >= 2.2.5, < 6.2.16 < 2.2.5, 6.2.16

redis >= 7.0.0, < 7.2.6 < 7.0.0, 7.2.6

redis >= 7.3.0, < 7.4.1 < 7.3.0, 7.4.1

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.