First published: Mon Oct 04 2021(Updated: )
Hiredis is a minimalistic C client library for the Redis database. In affected versions Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the `calloc()` call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow. Users of hiredis who are unable to update may set the [maxelements](https://github.com/redis/hiredis#reader-max-array-elements) context option to a value small enough that no overflow is possible.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redis Hiredis | <1.0.1 | |
Debian Debian Linux | =9.0 | |
Netapp Management Services For Element Software And Netapp Hci |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32765 is a vulnerability in the Hiredis C client library for Redis that allows for integer overflow when parsing multi-bulk protocol data.
This vulnerability can be exploited by providing maliciously crafted or corrupted multi-bulk protocol data to the Hiredis library, triggering an integer overflow.
The severity of CVE-2021-32765 is rated as high, with a CVSS score of 8.8.
Versions up to and excluding Hiredis 1.0.1, Debian Linux 9.0, and Netapp Management Services for Element Software and Netapp HCI are affected by CVE-2021-32765.
To fix CVE-2021-32765, it is recommended to update to a patched version of the affected software or apply the necessary security patches.