First published: Sun Jun 17 2018(Updated: )
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/redis | <5.0 | 5.0 |
redhat/redis | <4.0.10 | 4.0.10 |
redhat/redis | <3.2.12 | 3.2.12 |
Redislabs Redis | <4.0.10 | |
Redislabs Redis | =5.0-rc1 | |
Redislabs Redis | =5.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-12326.
The severity of CVE-2018-12326 is high with a CVSS score of 8.4.
CVE-2018-12326 affects Redis versions before 4.0.10 and 5.x before 5.0 RC3.
An attacker can exploit CVE-2018-12326 by using a crafted command line in the redis-cli tool, allowing code execution and privilege escalation.
More information about CVE-2018-12326 can be found at the following references: [Reference 1](https://access.redhat.com/errata/RHSA-2019:0052), [Reference 2](https://access.redhat.com/errata/RHSA-2019:0094), [Reference 3](https://access.redhat.com/errata/RHSA-2019:1860).