CVE-2021-41099 (CNNVD-202110-142)
中文标题:
Redis Labs Redis 输入验证错误漏洞
英文标题:
Integer overflow issue with strings in Redis
漏洞描述
中文描述:
Redis Labs Redis是美国Redis Labs公司的一套开源的使用ANSI C编写、支持网络、可基于内存亦可持久化的日志型、键值(Key-Value)存储数据库,并提供多种语言的API。 Redis 存在输入验证错误漏洞,该漏洞可能导致拒绝服务或远程代码执行。
英文描述:
Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the underlying string library can be used to corrupt the heap and potentially result with denial of service or remote code execution. The vulnerability involves changing the default proto-max-bulk-len configuration parameter to a very large value and constructing specially crafted network payloads or commands. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the proto-max-bulk-len configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| redis | redis | < 5.0.14 | - | - |
cpe:2.3:a:redis:redis:<_5.0.14:*:*:*:*:*:*:*
|
| redis | redis | >= 6.0.0, < 6.0.16 | - | - |
cpe:2.3:a:redis:redis:>=_6.0.0,_<_6.0.16:*:*:*:*:*:*:*
|
| redis | redis | >= 6.2.0, 6.2.6 | - | - |
cpe:2.3:a:redis:redis:>=_6.2.0,_6.2.6:*:*:*:*:*:*:*
|
| redis | redis | * | - | - |
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 33 | - | - |
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 34 | - | - |
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 35 | - | - |
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 11.0 | - | - |
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
|
| netapp | management_services_for_element_software_and_netapp_hci | - | - | - |
cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*
|
| oracle | communications_operations_monitor | 4.3 | - | - |
cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*
|
| oracle | communications_operations_monitor | 4.4 | - | - |
cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*
|
| oracle | communications_operations_monitor | 5.0 | - | - |
cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-41099 |
2025-11-11 15:21:06 | 2025-11-11 07:37:02 |
| NVD | nvd_CVE-2021-41099 |
2025-11-11 14:57:43 | 2025-11-11 07:45:20 |
| CNNVD | cnnvd_CNNVD-202110-142 |
2025-11-11 15:10:44 | 2025-11-11 07:56:57 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 输入验证错误
- cnnvd_id: 未提取 -> CNNVD-202110-142
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 3 -> 13
- data_sources: ['cve'] -> ['cve', 'nvd']