cvelist/2023/41xxx/CVE-2023-41056.json

124 lines
4.7 KiB
JSON
Raw Normal View History

2023-08-22 18:24:32 +00:00
{
2024-01-10 16:01:02 +00:00
"data_version": "4.0",
2023-08-22 18:24:32 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-41056",
2024-01-10 16:01:02 +00:00
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
2023-08-22 18:24:32 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-10 16:01:02 +00:00
"value": "Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-762: Mismatched Memory Management Routines",
"cweId": "CWE-762"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-190: Integer Overflow or Wraparound",
"cweId": "CWE-190"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "redis",
"product": {
"product_data": [
{
"product_name": "redis",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": ">= 7.0.9, < 7.0.15"
},
{
"version_affected": "=",
"version_value": ">= 7.2.0, < 7.2.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/redis/redis/security/advisories/GHSA-xr47-pcmx-fq2m",
"refsource": "MISC",
"name": "https://github.com/redis/redis/security/advisories/GHSA-xr47-pcmx-fq2m"
},
{
"url": "https://github.com/redis/redis/releases/tag/7.0.15",
"refsource": "MISC",
"name": "https://github.com/redis/redis/releases/tag/7.0.15"
},
{
"url": "https://github.com/redis/redis/releases/tag/7.2.4",
"refsource": "MISC",
"name": "https://github.com/redis/redis/releases/tag/7.2.4"
2024-01-18 03:00:38 +00:00
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JTGQJ2YLYB24B72I5B5H32YIMPVSWIT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JTGQJ2YLYB24B72I5B5H32YIMPVSWIT/"
2024-01-18 04:00:37 +00:00
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTWHPLC3RI67VNRDOIXLDVNC5YMYBMQN/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTWHPLC3RI67VNRDOIXLDVNC5YMYBMQN/"
2024-02-23 17:00:36 +00:00
},
{
"url": "https://security.netapp.com/advisory/ntap-20240223-0003/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20240223-0003/"
2024-01-10 16:01:02 +00:00
}
]
},
"source": {
"advisory": "GHSA-xr47-pcmx-fq2m",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2023-08-22 18:24:32 +00:00
}
]
}
}