First published: Mon Feb 22 2021(Updated: )
An integer overflow was found in Redis. Redis 4.0 or newer uses a configurable limit for the maximum supported bulk input size. The default size is 512MB which is a safe value for all platforms. Authenticated Redis users could increase the bulk input size by changing the "proto-max-bulk-len" configuration parameter, leading to heap corruption and potentially remote code execution.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redislabs Redis | >=4.0<5.0.11 | |
Redislabs Redis | >=6.0.0<6.0.11 |
As recommended in the upstream advisory, this issue can be mitigated by preventing clients from directly executing `CONFIG SET`: * Using Redis 6.0 or newer, ACL configuration can be used to block the command. * Using older versions, the `rename-command` configuration directive can be used to rename the command to a random string unknown to users, rendering it inaccessible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21309 is an integer overflow vulnerability found in Redis versions 4.0 or newer.
The CVE-2021-21309 vulnerability can be exploited to corrupt the heap and potentially result in remote code execution.
Redis versions 4.0 or newer are affected by CVE-2021-21309.
CVE-2021-21309 has a severity rating of 8.8 (high).
To fix the CVE-2021-21309 vulnerability, update Redis to version 5.0.11 if using version 5.0.x, or update to version 6.0.11 if using version 6.0.x. Alternatively, update to version 6.2.