CVE-2018-11219
high-risk
Published 2018-06-17
An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
Do I need to act?
~
2.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (7)
References (26)
Exploit
http://antirez.com/news/119
Third Party Advisory
http://www.securityfocus.com/bid/104552
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0052
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0094
Third Party Advisory
https://github.com/antirez/redis/issues/5017
Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES
Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES
Third Party Advisory
https://www.debian.org/security/2018/dsa-4230
Exploit
http://antirez.com/news/119
Third Party Advisory
http://www.securityfocus.com/bid/104552
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0052
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0094
and 6 more references
52
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
14/34 · Moderate