First published: Mon Apr 17 2023(Updated: )
Redis is vulnerable to a denial of service, caused by improper input validation. By sending a specially crafted HINCRBYFLOAT command, a local authenticated attacker could exploit this vulnerability to cause the redis-server process to crash.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redis Redis | <6.0.19 | |
Redis Redis | >=6.2.0<6.2.12 | |
Redis Redis | >=7.0.0<7.0.11 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
IBM Planning Analytics | <=2.0 | |
ubuntu/redis | <5:4.0.9-1ubuntu0.2+ | 5:4.0.9-1ubuntu0.2+ |
ubuntu/redis | <5:7.0.11-1 | 5:7.0.11-1 |
ubuntu/redis | <5:5.0.7-2ubuntu0.1+ | 5:5.0.7-2ubuntu0.1+ |
ubuntu/redis | <5:6.0.16-1ubuntu1+ | 5:6.0.16-1ubuntu1+ |
ubuntu/redis | <2:2.8.4-2ubuntu0.2+ | 2:2.8.4-2ubuntu0.2+ |
ubuntu/redis | <2:3.0.6-1ubuntu0.4+ | 2:3.0.6-1ubuntu0.4+ |
redhat/redis | <7.0.11 | 7.0.11 |
redhat/redis | <6.2.12 | 6.2.12 |
redhat/redis | <6.0.19 | 6.0.19 |
debian/redis | <=5:5.0.14-1+deb10u2<=5:6.0.16-1+deb11u2 | 5:5.0.14-1+deb10u5 5:7.0.15-1~deb12u1 5:7.0.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28856 is a vulnerability found in Redis that allows authenticated users to use the HINCRBYFLOAT command to create an invalid hash field that will crash Redis on access.
CVE-2023-28856 has a severity rating of 6.5, which is classified as medium.
To exploit CVE-2023-28856, an attacker needs to be an authenticated user and use the HINCRBYFLOAT command to create an invalid hash field that will crash Redis on access.
To fix CVE-2023-28856, update Redis to version 7.0.11, 6.2.12, or 6.0.19.
You can find more information about CVE-2023-28856 in the reference links: https://github.com/redis/redis/releases/tag/7.0.11, https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2187526, https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2187527