中危 Redis 中的 COMMAND GETKEYS 和 ACL 评估中的堆溢出 (CVE-2023-36824)
CVE编号
CVE-2023-36824利用情况
暂无补丁情况
官方补丁披露时间
2023-07-12漏洞描述
Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | redis | redis | * | From (including) 7.0.0 | Up to (excluding) 7.0.12 | ||||
运行在以下环境 | |||||||||
系统 | alpine_3.16 | redis | * | Up to (excluding) 7.0.12-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.17 | redis | * | Up to (excluding) 7.0.12-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | redis | * | Up to (excluding) 7.0.12-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | redis | * | Up to (excluding) 7.0.12-r0 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | redis | * | Up to (excluding) 5.0.14-1+deb10u2 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | redis | * | Up to (excluding) 6.0.16-1+deb11u2 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | redis | * | Up to (including) 7.0.11-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | redis | * | Up to (excluding) 5:7.0.12-1 | |||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 37 | - | |||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 38 | - | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | redis-doc | * | Up to (excluding) 7.0.12-1.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | redis-doc | * | Up to (excluding) 7.0.12-1.fc38 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.5 | redis7 | * | Up to (excluding) 7.0.8-150500.3.3.1 | |||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-122 | 堆缓冲区溢出 |
CWE-131 | 缓冲区大小计算不正确 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论