First published: Wed Mar 01 2023(Updated: )
(<a href="https://access.redhat.com/security/cve/CVE-2023-25155">CVE-2023-25155</a>) Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. <a href="https://github.com/gentoo/gentoo/pull/29860">https://github.com/gentoo/gentoo/pull/29860</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Redis |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2174305 is classified as a critical vulnerability due to the potential for integer overflow leading to server termination.
To fix REDHAT-BUG-2174305, it is recommended to apply the latest security patches from the Redis maintainers or upgrade to a fixed version.
The affected commands in REDHAT-BUG-2174305 are SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD.
If REDHAT-BUG-2174305 is exploited, it can lead to an integer overflow, resulting in a runtime assertion failure and termination of the Redis server.
Yes, REDHAT-BUG-2174305 can potentially be executed remotely by sending specially crafted commands to the Redis server.