Integer Overflow or Wraparound Affecting hiredis package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.29% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-HIREDIS-1728128
  • published5 Oct 2021
  • disclosed4 Oct 2021

Introduced: 4 Oct 2021

CVE-2021-32765  (opens in a new tab)
CWE-190  (opens in a new tab)
CWE-680  (opens in a new tab)

How to fix?

There is no fixed version for Debian:10 hiredis.

NVD Description

Note: Versions mentioned in the description apply only to the upstream hiredis package and not the hiredis package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

Hiredis is a minimalistic C client library for the Redis database. In affected versions Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted RESP mult-bulk protocol data. When parsing multi-bulk (array-like) replies, hiredis fails to check if count * sizeof(redisReply*) can be represented in SIZE_MAX. If it can not, and the calloc() call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow. Users of hiredis who are unable to update may set the maxelements context option to a value small enough that no overflow is possible.

CVSS Scores

version 3.1