CVE-2018-11218
high-risk
Published 2018-06-17
Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
Do I need to act?
!
80.3% chance of exploitation in next 30 days
EPSS score — higher than 20% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (7)
References (26)
Exploit
http://antirez.com/news/119
Third Party Advisory
http://www.securityfocus.com/bid/104553
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0052
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0094
Third Party Advisory
https://github.com/antirez/redis/issues/5017
Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES
Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES
Third Party Advisory
https://www.debian.org/security/2018/dsa-4230
Exploit
http://antirez.com/news/119
Third Party Advisory
http://www.securityfocus.com/bid/104553
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0052
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0094
and 6 more references
66
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
20/34 · Moderate
Exposure
14/34 · Moderate