Vulnerability Details CVE-2021-32672
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 59.3%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 4.0
Products affected by CVE-2021-32672
-
cpe:2.3:a:netapp:management_services_for_element_software:-
-
cpe:2.3:a:netapp:management_services_for_netapp_hci:-
-
cpe:2.3:a:oracle:communications_operations_monitor:4.3
-
cpe:2.3:a:oracle:communications_operations_monitor:4.4
-
cpe:2.3:a:oracle:communications_operations_monitor:5.0
-
cpe:2.3:a:redhat:software_collections:-
-
cpe:2.3:a:redis:redis:3.2.0
-
cpe:2.3:a:redis:redis:3.2.1
-
cpe:2.3:a:redis:redis:3.2.10
-
cpe:2.3:a:redis:redis:3.2.11
-
cpe:2.3:a:redis:redis:3.2.12
-
cpe:2.3:a:redis:redis:3.2.13
-
cpe:2.3:a:redis:redis:3.2.2
-
cpe:2.3:a:redis:redis:3.2.3
-
cpe:2.3:a:redis:redis:3.2.4
-
cpe:2.3:a:redis:redis:3.2.5
-
cpe:2.3:a:redis:redis:3.2.6
-
cpe:2.3:a:redis:redis:3.2.7
-
cpe:2.3:a:redis:redis:3.2.8
-
cpe:2.3:a:redis:redis:3.2.9
-
cpe:2.3:a:redis:redis:4.0.0
-
cpe:2.3:a:redis:redis:4.0.1
-
cpe:2.3:a:redis:redis:4.0.10
-
cpe:2.3:a:redis:redis:4.0.11
-
cpe:2.3:a:redis:redis:4.0.12
-
cpe:2.3:a:redis:redis:4.0.13
-
cpe:2.3:a:redis:redis:4.0.14
-
cpe:2.3:a:redis:redis:4.0.2
-
cpe:2.3:a:redis:redis:4.0.3
-
cpe:2.3:a:redis:redis:4.0.4
-
cpe:2.3:a:redis:redis:4.0.5
-
cpe:2.3:a:redis:redis:4.0.6
-
cpe:2.3:a:redis:redis:4.0.7
-
cpe:2.3:a:redis:redis:4.0.8
-
cpe:2.3:a:redis:redis:4.0.9
-
cpe:2.3:a:redis:redis:5.0.0
-
cpe:2.3:a:redis:redis:5.0.1
-
cpe:2.3:a:redis:redis:5.0.10
-
cpe:2.3:a:redis:redis:5.0.11
-
cpe:2.3:a:redis:redis:5.0.12
-
cpe:2.3:a:redis:redis:5.0.13
-
cpe:2.3:a:redis:redis:5.0.2
-
cpe:2.3:a:redis:redis:5.0.3
-
cpe:2.3:a:redis:redis:5.0.4
-
cpe:2.3:a:redis:redis:5.0.5
-
cpe:2.3:a:redis:redis:5.0.6
-
cpe:2.3:a:redis:redis:5.0.7
-
cpe:2.3:a:redis:redis:5.0.8
-
cpe:2.3:a:redis:redis:5.0.9
-
cpe:2.3:a:redis:redis:6.0.0
-
cpe:2.3:a:redis:redis:6.0.1
-
cpe:2.3:a:redis:redis:6.0.10
-
cpe:2.3:a:redis:redis:6.0.11
-
cpe:2.3:a:redis:redis:6.0.12
-
cpe:2.3:a:redis:redis:6.0.13
-
cpe:2.3:a:redis:redis:6.0.14
-
cpe:2.3:a:redis:redis:6.0.15
-
cpe:2.3:a:redis:redis:6.0.2
-
cpe:2.3:a:redis:redis:6.0.3
-
cpe:2.3:a:redis:redis:6.0.4
-
cpe:2.3:a:redis:redis:6.0.5
-
cpe:2.3:a:redis:redis:6.0.6
-
cpe:2.3:a:redis:redis:6.0.7
-
cpe:2.3:a:redis:redis:6.0.8
-
cpe:2.3:a:redis:redis:6.0.9
-
cpe:2.3:a:redis:redis:6.2.0
-
cpe:2.3:a:redis:redis:6.2.1
-
cpe:2.3:a:redis:redis:6.2.2
-
cpe:2.3:a:redis:redis:6.2.3
-
cpe:2.3:a:redis:redis:6.2.4
-
cpe:2.3:a:redis:redis:6.2.5
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:debian:debian_linux:11.0
-
cpe:2.3:o:fedoraproject:fedora:33
-
cpe:2.3:o:fedoraproject:fedora:34
-
cpe:2.3:o:fedoraproject:fedora:35
-
cpe:2.3:o:redhat:enterprise_linux:8.0