CVE-2021-32628 (CNNVD-202110-139)
中文标题:
Redis Labs Redis 输入验证错误漏洞
英文标题:
Vulnerability in handling large ziplists
漏洞描述
中文描述:
Redis Labs Redis是美国Redis Labs公司的一套开源的使用ANSI C编写、支持网络、可基于内存亦可持久化的日志型、键值(Key-Value)存储数据库,并提供多种语言的API。 Redis 存在输入验证错误漏洞,该漏洞可导致远程代码执行。
英文描述:
Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the ziplist data structure used by all versions of Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves modifying the default ziplist configuration parameters (hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value) to a very large value, and then constructing specially crafted commands to create very large ziplists. The problem is fixed in Redis versions 6.2.6, 6.0.16, 5.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the above configuration parameters. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| redis | redis | >= 6.2.0, < 6.2.6 | - | - |
cpe:2.3:a:redis:redis:>=_6.2.0,_<_6.2.6:*:*:*:*:*:*:*
|
| redis | redis | >= 6.0.0, < 6.0.16 | - | - |
cpe:2.3:a:redis:redis:>=_6.0.0,_<_6.0.16:*:*:*:*:*:*:*
|
| redis | redis | < 5.0.14 | - | - |
cpe:2.3:a:redis:redis:<_5.0.14:*:*:*:*:*:*:*
|
| redis | redis | * | - | - |
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 33 | - | - |
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 34 | - | - |
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 35 | - | - |
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 11.0 | - | - |
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
|
| netapp | management_services_for_element_software | - | - | - |
cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*
|
| netapp | management_services_for_netapp_hci | - | - | - |
cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*
|
| oracle | communications_operations_monitor | 4.3 | - | - |
cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*
|
| oracle | communications_operations_monitor | 4.4 | - | - |
cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*
|
| oracle | communications_operations_monitor | 5.0 | - | - |
cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-32628 |
2025-11-11 15:20:58 | 2025-11-11 07:36:52 |
| NVD | nvd_CVE-2021-32628 |
2025-11-11 14:57:43 | 2025-11-11 07:45:11 |
| CNNVD | cnnvd_CNNVD-202110-139 |
2025-11-11 15:10:44 | 2025-11-11 07:56:57 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 输入验证错误
- cnnvd_id: 未提取 -> CNNVD-202110-139
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 3 -> 14
- data_sources: ['cve'] -> ['cve', 'nvd']