SB2018062020 - Multiple vulnerabilities in Redis 



SB2018062020 - Multiple vulnerabilities in Redis

Published: June 20, 2018

Security Bulletin ID SB2018062020
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2018-12326)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to a buffer overflow condition in the redis-clicomponent. A local attacker can execute a specially crafted command that submits malicious input, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Type confusion (CVE-ID: CVE-2018-12453)

The vulnerability allows a remote authenticated attacker to cause DoS condition on the target system.

The vulnerability exists in the xgroupCommand function due to improper handling of an XGROUP command where the key is not a stream by the xgroupCommand function, as defined in the t_stream.c source code file. A remote attacker can execute an XGROUP command that submits malicious input, trigger a type confusion condition and cause the service to crash.


Remediation

Install update from vendor's website.