CVE-2018-11218

Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
References
Link Resource
http://antirez.com/news/119 Exploit Third Party Advisory
http://www.securityfocus.com/bid/104553 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:0052 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0094 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1860
https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3 Exploit Patch Third Party Advisory
https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0 Patch Third Party Advisory
https://github.com/antirez/redis/issues/5017 Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES Third Party Advisory
https://security.gentoo.org/glsa/201908-04
https://www.debian.org/security/2018/dsa-4230 Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
http://antirez.com/news/119 Exploit Third Party Advisory
http://www.securityfocus.com/bid/104553 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:0052 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0094 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1860
https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3 Exploit Patch Third Party Advisory
https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0 Patch Third Party Advisory
https://github.com/antirez/redis/issues/5017 Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES Third Party Advisory
https://security.gentoo.org/glsa/201908-04
https://www.debian.org/security/2018/dsa-4230 Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redislabs:redis:5.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () http://antirez.com/news/119 - Exploit, Third Party Advisory () http://antirez.com/news/119 - Exploit, Third Party Advisory
References () http://www.securityfocus.com/bid/104553 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104553 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2019:0052 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0052 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0094 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0094 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1860 - () https://access.redhat.com/errata/RHSA-2019:1860 -
References () https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3 - Exploit, Patch, Third Party Advisory () https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3 - Exploit, Patch, Third Party Advisory
References () https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0 - Patch, Third Party Advisory () https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0 - Patch, Third Party Advisory
References () https://github.com/antirez/redis/issues/5017 - Third Party Advisory () https://github.com/antirez/redis/issues/5017 - Third Party Advisory
References () https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES - Third Party Advisory () https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES - Third Party Advisory
References () https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES - Third Party Advisory () https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES - Third Party Advisory
References () https://security.gentoo.org/glsa/201908-04 - () https://security.gentoo.org/glsa/201908-04 -
References () https://www.debian.org/security/2018/dsa-4230 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4230 - Third Party Advisory
References () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Third Party Advisory, Patch () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Third Party Advisory

Information

Published : 2018-06-17 17:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-11218

Mitre link : CVE-2018-11218

CVE.ORG link : CVE-2018-11218


JSON object : View

Products Affected

redhat

  • openstack

debian

  • debian_linux

redislabs

  • redis

oracle

  • communications_operations_monitor
CWE
CWE-787

Out-of-bounds Write