CVE-2022-24736
Published Apr 27, 2022
Last updated a year ago
Overview
- Description
- Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.
- Source
- security-advisories@github.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:P
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "250A0F22-00E1-4D99-B104-9164482B84B1", "versionEndExcluding": "6.2.7" }, { "criteria": "cpe:2.3:a:redis:redis:7.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EC787AB-59D2-4562-8C10-C4C3FBDBFD74" }, { "criteria": "cpe:2.3:a:redis:redis:7.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C43EE3A8-E7A4-471C-BFC1-01E014A8C8A1" }, { "criteria": "cpe:2.3:a:redis:redis:7.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "482D8DA2-EE8F-4FF9-93EB-996E8D5DA013" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1" }, { "criteria": "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4455CF3A-CC91-4BE4-A7AB-929AC82E34F5" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBE1A019-7BB6-4226-8AC4-9D6927ADAEFA" }, { "criteria": "cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B98BAEB2-A540-4E8A-A946-C4331B913AFD" }, { "criteria": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8FBE260-E306-4215-80C0-D2D27CA43E0F" } ], "operator": "OR" } ] } ]