cve/2023/CVE-2023-41056.md

19 lines
951 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-41056](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41056)
![](https://img.shields.io/static/v1?label=Product&message=redis&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%207.0.9%2C%20%3C%207.0.15%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%3A%20Integer%20Overflow%20or%20Wraparound&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-762%3A%20Mismatched%20Memory%20Management%20Routines&color=brighgreen)
### Description
Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds