First published: Fri Jan 20 2023(Updated: )
Redis is vulnerable to a denial of service, caused by an integer overflow. By sending specially crafted HRANDFIELD and ZRANDMEMBER commands, a local authenticated attacker could exploit this vulnerability to cause the application to crash.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redis Redis | >=6.2.0<6.2.9 | |
Redis Redis | >=7.0.0<7.0.8 | |
IBM Planning Analytics | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22458 is a vulnerability in Redis that allows authenticated users to trigger a denial-of-service by crashing Redis with an assertion failure.
Redis versions 6.2 up to but not including 6.2.9, as well as versions 7.0 up to but not including 7.0.8, are affected by CVE-2023-22458.
CVE-2023-22458 has a severity rating of 5.5 (medium).
Authenticated users can exploit CVE-2023-22458 by issuing a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments.
To fix CVE-2023-22458, update Redis to version 6.2.9 or 7.0.8 or newer.