mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
124 lines
4.7 KiB
JSON
124 lines
4.7 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-41056",
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-762: Mismatched Memory Management Routines",
|
|
"cweId": "CWE-762"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-190: Integer Overflow or Wraparound",
|
|
"cweId": "CWE-190"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "redis",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "redis",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": ">= 7.0.9, < 7.0.15"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": ">= 7.2.0, < 7.2.4"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/redis/redis/security/advisories/GHSA-xr47-pcmx-fq2m",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/redis/redis/security/advisories/GHSA-xr47-pcmx-fq2m"
|
|
},
|
|
{
|
|
"url": "https://github.com/redis/redis/releases/tag/7.0.15",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/redis/redis/releases/tag/7.0.15"
|
|
},
|
|
{
|
|
"url": "https://github.com/redis/redis/releases/tag/7.2.4",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/redis/redis/releases/tag/7.2.4"
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JTGQJ2YLYB24B72I5B5H32YIMPVSWIT/",
|
|
"refsource": "MISC",
|
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JTGQJ2YLYB24B72I5B5H32YIMPVSWIT/"
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTWHPLC3RI67VNRDOIXLDVNC5YMYBMQN/",
|
|
"refsource": "MISC",
|
|
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTWHPLC3RI67VNRDOIXLDVNC5YMYBMQN/"
|
|
},
|
|
{
|
|
"url": "https://security.netapp.com/advisory/ntap-20240223-0003/",
|
|
"refsource": "MISC",
|
|
"name": "https://security.netapp.com/advisory/ntap-20240223-0003/"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-xr47-pcmx-fq2m",
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.1,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |