Integer Overflow or Wraparound Affecting RedisBloom/RedisBloom package, versions [,2.4.13)[2.6.0,2.6.16)[2.8.0,2.8.5)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-REDISBLOOMREDISBLOOM-8608455
  • published9 Jan 2025
  • disclosed8 Jan 2025
  • creditRicardo Silva, Gabriel Quadros

Introduced: 8 Jan 2025

NewCVE-2024-55656  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade RedisBloom/RedisBloom to version 2.4.13, 2.6.16, 2.8.5 or higher.

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound through the CMS.INITBYDIM command which initializes a Count-Min Sketch with user-specified dimensions. An attacker can cause memory allocation errors and perform unauthorized read and write operations beyond the allocated memory space by manipulating the width and depth values.

Note:

This is only exploitable if the attacker is a Redis client that knows the password.

CVSS Scores

version 4.0
version 3.1