#VU78507 Heap-based buffer overflow in Redis - CVE-2023-36824
Published: July 21, 2023
Redis
Redis Labs
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when extracting key names from a command and a list of arguments. A local user can execute the "COMMAND GETKEYS" or "COMMAND GETKEYSANDFLAGS" commands or execute a specially crafted command that refers to a variadic list of key names along with ACL rules that match key names to trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Remediation
External links
- https://github.com/redis/redis/security/advisories/GHSA-4cfx-h9gq-xpx3
- https://github.com/redis/redis/releases/tag/7.0.12
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDNNH2ONMVNBQ6LUIAOAGDNFPKXNST5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIF5MAGYARYUMRFK7PQI7HYXMK2HZE5T/