PT-2025-3137 · Redis · Redisbloom
Gabriel Quadros
+3
·
Published
2024-07-18
·
Updated
2025-01-09
·
CVE-2024-55656
9.0
High
Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
RedisBloom versions prior to 2.2.19
RedisBloom versions prior to 2.4.12
RedisBloom versions prior to 2.6.14
RedisBloom versions prior to 2.8.2
Description:
There is an integer overflow vulnerability in RedisBloom, a module used in Redis. This vulnerability allows an attacker, who is a Redis client with knowledge of the password, to allocate memory in the heap that is lesser than the required memory due to wraparound. As a result, read and write operations can be performed beyond the allocated memory, leading to information leaks and out-of-bounds writes. The integer overflow is located in the `CMS.INITBYDIM` command, which initializes a Count-Min Sketch to dimensions specified by the user. It accepts two values, `width` and `depth`, and uses them to allocate memory in `NewCMSketch()`.
Recommendations:
For versions prior to 2.2.19, update to version 2.2.19 or later.
For versions prior to 2.4.12, update to version 2.4.12 or later.
For versions prior to 2.6.14, update to version 2.6.14 or later.
For versions prior to 2.8.2, update to version 2.8.2 or later.
As a temporary workaround, consider restricting access to the `CMS.INITBYDIM` command until a patch is available. Avoid using the `width` and `depth` parameters in the `CMS.INITBYDIM` command to minimize the risk of exploitation.
Fix
RCE
Integer Overflow
Heap Based Buffer Overflow
Related Identifiers
Affected Products
References · 11
- https://zerodayinitiative.com/advisories/ZDI-25-009 · Security Note
- https://bdu.fstec.ru/vul/2025-03163 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2024-55656 · Security Note
- https://github.com/RedisBloom/RedisBloom/security/advisories/GHSA-x5rx-rmq3-ff3h⭐ 1698 🔗 260 · Note
- https://github.com/RedisBloom/RedisBloom⭐ 1698 🔗 260 · Note
- https://twitter.com/VulmonFeeds/status/1877044037959483683 · Twitter Post
- https://twitter.com/CVEnew/status/1877020094523482224 · Twitter Post
- https://twitter.com/CveFindCom/status/1877022918435119561 · Twitter Post
- https://redis.io/blog/security-advisory-cve-2024-46981-cve-2024-51737-cve-2024-51480-cve-2024-55656 · Note
- https://twitter.com/TheZDIBugs/status/1877481677854814464 · Twitter Post
- https://t.me/cvedetector/14693 · Telegram Post