Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1594291 - (CVE-2018-12326) CVE-2018-12326 redis: code execution via a crafted command line
CVE-2018-12326 redis: code execution via a crafted command line
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20180613,reported=2...
: Security
Depends On: 1595070 1595071 1595072 1595074 1595075 1595076 1595077 1596254 1594294 1595073 1595078
Blocks: 1594295
  Show dependency treegraph
 
Reported: 2018-06-22 10:34 EDT by Laura Pardo
Modified: 2018-09-23 23:10 EDT (History)
33 users (show)

See Also:
Fixed In Version: redis 5.0-rc2, redis 4.0.10
Doc Type: If docs needed, set a value
Doc Text:
The Redis command line tool 'redis-cli' is vulnerable to a buffer overflow through the -h (host) command line parameter. The redis-cli may be used by other services; if these services do not adequately filter the host input it could lead to code execution with the privilege level of that service.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Laura Pardo 2018-06-22 10:34:03 EDT
A flaw was found in Redis before 4.0.10 and 5.x before 5.0 RC2. A buffer overflow in redis-cli allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line.


References:
https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES 	
https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES
https://gist.github.com/fakhrizulkifli/f831f40ec6cde4f744c552503d8698f0 	 	
https://www.exploit-db.com/exploits/44904/ 	

Patch:
https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50
Comment 1 Laura Pardo 2018-06-22 10:34:52 EDT
Created redis tracking bugs for this issue:

Affects: epel-all [bug 1594294]
Comment 2 Joshua Padman 2018-06-25 23:45:10 EDT
The Redis command line tool "redis-cli" is vulnerable to a buffer overflow through the -h (host) command line parameter. If using redis-cli directly this could cause a self DoS or code execution with the same privilege level the command was executed with. This is unlikely to impact the security of the system as the attacker would already require access.
It is possible that products are built to call redis-cli and may allow an attacker with access to the layered product to gain command execution on the underlying system. This would require the unfiltered host parameter to be passed from the layered product to redis-cli

Specific to OpenStack:
The default key-value data store in OpenStack is memcached. Regardless, none of the components that are included with Red Hat OpenStack make calls to redis-cli in a way that would allow the host value to be manipulated.

Note You need to log in before you can comment on or make changes to this bug.