Action not permitted
Modal body text goes here.
cve-2018-11218
Vulnerability from cvelistv5
Published
2018-06-17 17:00
Modified
2024-08-05 08:01
Severity ?
EPSS score ?
Summary
Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:01:52.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104553", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104553" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/antirez/redis/issues/5017" }, { "name": "DSA-4230", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4230" }, { "name": "RHSA-2019:0052", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0052" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://antirez.com/news/119" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3" }, { "name": "RHSA-2019:0094", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0094" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "RHSA-2019:1860", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1860" }, { "name": "GLSA-201908-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-09T22:06:05", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "104553", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104553" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/antirez/redis/issues/5017" }, { "name": "DSA-4230", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4230" }, { "name": "RHSA-2019:0052", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0052" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://antirez.com/news/119" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3" }, { "name": "RHSA-2019:0094", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0094" }, { "tags": [ "x_refsource_MISC" ], "url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES" }, { "tags": [ "x_refsource_MISC" ], "url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "RHSA-2019:1860", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1860" }, { "name": "GLSA-201908-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-04" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11218", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "104553", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104553" }, { "name": "https://github.com/antirez/redis/issues/5017", "refsource": "MISC", "url": "https://github.com/antirez/redis/issues/5017" }, { "name": "DSA-4230", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4230" }, { "name": "RHSA-2019:0052", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0052" }, { "name": "https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0", "refsource": "MISC", "url": "https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0" }, { "name": "http://antirez.com/news/119", "refsource": "MISC", "url": "http://antirez.com/news/119" }, { "name": "https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3", "refsource": "MISC", "url": "https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3" }, { "name": "RHSA-2019:0094", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0094" }, { "name": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES", "refsource": "MISC", "url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES" }, { "name": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES", "refsource": "MISC", "url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "RHSA-2019:1860", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1860" }, { "name": "GLSA-201908-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-04" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-11218", "datePublished": "2018-06-17T17:00:00", "dateReserved": "2018-05-16T00:00:00", "dateUpdated": "2024-08-05T08:01:52.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-11218\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-06-17T17:29:00.277\",\"lastModified\":\"2021-08-04T17:14:46.777\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto una corrupci\u00f3n de memoria en la biblioteca cmsgpack en el subsistema Lua en Redis en versiones anteriores a la 3.2.12, versiones 4.x anteriores a la 4.0.10 y versiones 5.x anteriores a la 5.0 RC2 debido a desbordamientos de b\u00fafer basados en pila.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":7.5},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.12\",\"matchCriteriaId\":\"A638FE37-0FA9-40E6-90AD-5241977EE2E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndExcluding\":\"4.0.10\",\"matchCriteriaId\":\"2E46FE4D-C1EC-4270-A5B1-349DD726AF87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redislabs:redis:5.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6037E16-4EE7-44F6-9045-DA6B705B0F5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D52F557F-D0A0-43D3-85F1-F10B6EBFAEDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3517A27-E6EE-497C-9996-F78171BBE90F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704CFA1A-953E-4105-BFBE-406034B83DED\"}]}]}],\"references\":[{\"url\":\"http://antirez.com/news/119\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104553\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0052\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0094\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1860\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/antirez/redis/issues/5017\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201908-04\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2018/dsa-4230\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"Patch\"]}]}}" } }
ghsa-84mm-87vg-44q4
Vulnerability from github
Published
2022-05-13 01:07
Modified
2022-05-13 01:07
Severity ?
Details
Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
{ "affected": [], "aliases": [ "CVE-2018-11218" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-06-17T17:29:00Z", "severity": "CRITICAL" }, "details": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.", "id": "GHSA-84mm-87vg-44q4", "modified": "2022-05-13T01:07:35Z", "published": "2022-05-13T01:07:35Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11218" }, { "type": "WEB", "url": "https://github.com/antirez/redis/issues/5017" }, { "type": "WEB", "url": "https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3" }, { "type": "WEB", "url": "https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0052" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0094" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:1860" }, { "type": "WEB", "url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES" }, { "type": "WEB", "url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201908-04" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4230" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "type": "WEB", "url": "http://antirez.com/news/119" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/104553" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
rhsa-2019_1860
Vulnerability from csaf_redhat
Published
2019-07-25 16:10
Modified
2024-11-15 03:13
Summary
Red Hat Security Advisory: rh-redis32-redis security update
Notes
Topic
An update for rh-redis32-redis is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)
* redis: Heap corruption in lua_cmsgpack.c (CVE-2018-11218)
* redis: Integer overflow in lua_struct.c:b_unpack() (CVE-2018-11219)
* redis: Code execution in redis-cli via crafted command line arguments (CVE-2018-12326)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-redis32-redis is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)\n\n* redis: Heap corruption in lua_cmsgpack.c (CVE-2018-11218)\n\n* redis: Integer overflow in lua_struct.c:b_unpack() (CVE-2018-11219)\n\n* redis: Code execution in redis-cli via crafted command line arguments (CVE-2018-12326)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1860", "url": "https://access.redhat.com/errata/RHSA-2019:1860" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1590062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590062" }, { "category": "external", "summary": "1590067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590067" }, { "category": "external", "summary": "1594291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594291" }, { "category": "external", "summary": "1723918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1860.json" } ], "title": "Red Hat Security Advisory: rh-redis32-redis security update", "tracking": { "current_release_date": "2024-11-15T03:13:13+00:00", "generator": { "date": "2024-11-15T03:13:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:1860", "initial_release_date": "2019-07-25T16:10:02+00:00", "revision_history": [ { "date": "2019-07-25T16:10:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-07-25T16:10:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T03:13:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.3-7.4.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64", "product": { "name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64", "product_id": "rh-redis32-redis-0:3.2.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-redis32-redis@3.2.13-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "product": { "name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "product_id": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-redis32-redis-debuginfo@3.2.13-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-redis32-redis-0:3.2.13-1.el6.x86_64", "product": { "name": "rh-redis32-redis-0:3.2.13-1.el6.x86_64", "product_id": "rh-redis32-redis-0:3.2.13-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-redis32-redis@3.2.13-1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "product": { "name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "product_id": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-redis32-redis-debuginfo@3.2.13-1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-redis32-redis-0:3.2.13-1.el7.src", "product": { "name": "rh-redis32-redis-0:3.2.13-1.el7.src", "product_id": "rh-redis32-redis-0:3.2.13-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-redis32-redis@3.2.13-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-redis32-redis-0:3.2.13-1.el6.src", "product": { "name": "rh-redis32-redis-0:3.2.13-1.el6.src", "product_id": "rh-redis32-redis-0:3.2.13-1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-redis32-redis@3.2.13-1.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el6.src", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64" }, "product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el6.src", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64" }, "product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" }, "product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" }, "product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" }, "product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" }, "product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64" }, "product_reference": "rh-redis32-redis-0:3.2.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" }, "product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11218", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2018-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1590067" } ], "notes": [ { "category": "description", "text": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Heap corruption in lua_cmsgpack.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11218" }, { "category": "external", "summary": "RHBZ#1590067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11218", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11218" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11218", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11218" }, { "category": "external", "summary": "http://antirez.com/news/119", "url": "http://antirez.com/news/119" } ], "release_date": "2018-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-25T16:10:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1860" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "redis: Heap corruption in lua_cmsgpack.c" }, { "cve": "CVE-2018-11219", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1590062" } ], "notes": [ { "category": "description", "text": "An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow in lua_struct.c:b_unpack()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11219" }, { "category": "external", "summary": "RHBZ#1590062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590062" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11219", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11219" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11219", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11219" }, { "category": "external", "summary": "http://antirez.com/news/119", "url": "http://antirez.com/news/119" } ], "release_date": "2018-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-25T16:10:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1860" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "redis: Integer overflow in lua_struct.c:b_unpack()" }, { "cve": "CVE-2018-12326", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2018-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1594291" } ], "notes": [ { "category": "description", "text": "The Redis command line tool \u0027redis-cli\u0027 is vulnerable to a buffer overflow through the -h (host) command line parameter. The redis-cli may be used by other services; if these services do not adequately filter the host input it could lead to code execution with the privilege level of that service.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Code execution in redis-cli via crafted command line arguments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12326" }, { "category": "external", "summary": "RHBZ#1594291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12326", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12326" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12326", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12326" } ], "release_date": "2018-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-25T16:10:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1860" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "redis: Code execution in redis-cli via crafted command line arguments" }, { "cve": "CVE-2019-10192", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2019-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1723918" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By carefully corrupting a HyperLogLog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding into writing up to 3 bytes beyond the end of a heap-allocated buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client", "title": "Vulnerability summary" }, { "category": "other", "text": "* This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.\n* This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10192" }, { "category": "external", "summary": "RHBZ#1723918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10192", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192" }, { "category": "external", "summary": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES", "url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES" }, { "category": "external", "summary": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES", "url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES" }, { "category": "external", "summary": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES", "url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES" } ], "release_date": "2019-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-25T16:10:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1860" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src", "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64", "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src", "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64", "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client" } ] }
rhsa-2019_0094
Vulnerability from csaf_redhat
Published
2019-01-16 17:55
Modified
2024-11-15 00:38
Summary
Red Hat Security Advisory: redis security update
Notes
Topic
An update for redis is now available for Red Hat OpenStack Platform 13.0 (Queens).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Heap corruption in lua_cmsgpack.c (CVE-2018-11218)
* redis: Integer overflow in lua_struct.c:b_unpack() (CVE-2018-11219)
* redis: code execution via a crafted command line (CVE-2018-12326)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for redis is now available for Red Hat OpenStack Platform 13.0 (Queens).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Heap corruption in lua_cmsgpack.c (CVE-2018-11218)\n\n* redis: Integer overflow in lua_struct.c:b_unpack() (CVE-2018-11219)\n\n* redis: code execution via a crafted command line (CVE-2018-12326)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0094", "url": "https://access.redhat.com/errata/RHSA-2019:0094" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1590062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590062" }, { "category": "external", "summary": "1590067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590067" }, { "category": "external", "summary": "1594291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594291" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0094.json" } ], "title": "Red Hat Security Advisory: redis security update", "tracking": { "current_release_date": "2024-11-15T00:38:53+00:00", "generator": { "date": "2024-11-15T00:38:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0094", "initial_release_date": "2019-01-16T17:55:09+00:00", "revision_history": [ { "date": "2019-01-16T17:55:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-01-16T17:55:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T00:38:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0", "product": { "name": "Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0", "product": { "name": "Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "product": { "name": "redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "product_id": "redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redis-debuginfo@3.2.8-3.el7ost?arch=x86_64" } } }, { "category": "product_version", "name": "redis-0:3.2.8-3.el7ost.x86_64", "product": { "name": "redis-0:3.2.8-3.el7ost.x86_64", "product_id": "redis-0:3.2.8-3.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redis@3.2.8-3.el7ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "product": { "name": "redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "product_id": "redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/redis-debuginfo@3.2.8-3.el7ost?arch=ppc64le" } } }, { "category": "product_version", "name": "redis-0:3.2.8-3.el7ost.ppc64le", "product": { "name": "redis-0:3.2.8-3.el7ost.ppc64le", "product_id": "redis-0:3.2.8-3.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/redis@3.2.8-3.el7ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "redis-0:3.2.8-3.el7ost.src", "product": { "name": "redis-0:3.2.8-3.el7ost.src", "product_id": "redis-0:3.2.8-3.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redis@3.2.8-3.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redis-0:3.2.8-3.el7ost.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.ppc64le" }, "product_reference": "redis-0:3.2.8-3.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "redis-0:3.2.8-3.el7ost.src as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.src" }, "product_reference": "redis-0:3.2.8-3.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "redis-0:3.2.8-3.el7ost.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.x86_64" }, "product_reference": "redis-0:3.2.8-3.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "redis-debuginfo-0:3.2.8-3.el7ost.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le" }, "product_reference": "redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "redis-debuginfo-0:3.2.8-3.el7ost.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64" }, "product_reference": "redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "redis-0:3.2.8-3.el7ost.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.ppc64le" }, "product_reference": "redis-0:3.2.8-3.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "redis-0:3.2.8-3.el7ost.src as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.src" }, "product_reference": "redis-0:3.2.8-3.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "redis-0:3.2.8-3.el7ost.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.x86_64" }, "product_reference": "redis-0:3.2.8-3.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "redis-debuginfo-0:3.2.8-3.el7ost.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le" }, "product_reference": "redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "redis-debuginfo-0:3.2.8-3.el7ost.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64" }, "product_reference": "redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11218", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2018-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1590067" } ], "notes": [ { "category": "description", "text": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Heap corruption in lua_cmsgpack.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11218" }, { "category": "external", "summary": "RHBZ#1590067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11218", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11218" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11218", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11218" }, { "category": "external", "summary": "http://antirez.com/news/119", "url": "http://antirez.com/news/119" } ], "release_date": "2018-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:55:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "redis: Heap corruption in lua_cmsgpack.c" }, { "cve": "CVE-2018-11219", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1590062" } ], "notes": [ { "category": "description", "text": "An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow in lua_struct.c:b_unpack()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11219" }, { "category": "external", "summary": "RHBZ#1590062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590062" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11219", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11219" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11219", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11219" }, { "category": "external", "summary": "http://antirez.com/news/119", "url": "http://antirez.com/news/119" } ], "release_date": "2018-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:55:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "redis: Integer overflow in lua_struct.c:b_unpack()" }, { "cve": "CVE-2018-12326", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2018-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1594291" } ], "notes": [ { "category": "description", "text": "The Redis command line tool \u0027redis-cli\u0027 is vulnerable to a buffer overflow through the -h (host) command line parameter. The redis-cli may be used by other services; if these services do not adequately filter the host input it could lead to code execution with the privilege level of that service.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Code execution in redis-cli via crafted command line arguments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12326" }, { "category": "external", "summary": "RHBZ#1594291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12326", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12326" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12326", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12326" } ], "release_date": "2018-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:55:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.src", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-3.el7ost.x86_64", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.ppc64le", "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-3.el7ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "redis: Code execution in redis-cli via crafted command line arguments" } ] }
rhsa-2019_0052
Vulnerability from csaf_redhat
Published
2019-01-16 17:09
Modified
2024-11-15 00:38
Summary
Red Hat Security Advisory: redis security update
Notes
Topic
An update for redis is now available for Red Hat OpenStack Platform 10.0 (Newton).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Heap corruption in lua_cmsgpack.c (CVE-2018-11218)
* redis: Integer overflow in lua_struct.c:b_unpack() (CVE-2018-11219)
* redis: code execution via a crafted command line (CVE-2018-12326)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for redis is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Heap corruption in lua_cmsgpack.c (CVE-2018-11218)\n\n* redis: Integer overflow in lua_struct.c:b_unpack() (CVE-2018-11219)\n\n* redis: code execution via a crafted command line (CVE-2018-12326)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0052", "url": "https://access.redhat.com/errata/RHSA-2019:0052" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1590062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590062" }, { "category": "external", "summary": "1590067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590067" }, { "category": "external", "summary": "1594291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594291" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0052.json" } ], "title": "Red Hat Security Advisory: redis security update", "tracking": { "current_release_date": "2024-11-15T00:38:42+00:00", "generator": { "date": "2024-11-15T00:38:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0052", "initial_release_date": "2019-01-16T17:09:43+00:00", "revision_history": [ { "date": "2019-01-16T17:09:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-01-16T17:09:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T00:38:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 10.0", "product": { "name": "Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "redis-0:3.0.6-4.el7ost.x86_64", "product": { "name": "redis-0:3.0.6-4.el7ost.x86_64", "product_id": "redis-0:3.0.6-4.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redis@3.0.6-4.el7ost?arch=x86_64" } } }, { "category": "product_version", "name": "redis-debuginfo-0:3.0.6-4.el7ost.x86_64", "product": { "name": "redis-debuginfo-0:3.0.6-4.el7ost.x86_64", "product_id": "redis-debuginfo-0:3.0.6-4.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redis-debuginfo@3.0.6-4.el7ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "redis-0:3.0.6-4.el7ost.src", "product": { "name": "redis-0:3.0.6-4.el7ost.src", "product_id": "redis-0:3.0.6-4.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redis@3.0.6-4.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redis-0:3.0.6-4.el7ost.src as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.src" }, "product_reference": "redis-0:3.0.6-4.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "redis-0:3.0.6-4.el7ost.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.x86_64" }, "product_reference": "redis-0:3.0.6-4.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "redis-debuginfo-0:3.0.6-4.el7ost.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-4.el7ost.x86_64" }, "product_reference": "redis-debuginfo-0:3.0.6-4.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11218", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2018-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1590067" } ], "notes": [ { "category": "description", "text": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Heap corruption in lua_cmsgpack.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.src", "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.x86_64", "7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-4.el7ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11218" }, { "category": "external", "summary": "RHBZ#1590067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11218", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11218" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11218", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11218" }, { "category": "external", "summary": "http://antirez.com/news/119", "url": "http://antirez.com/news/119" } ], "release_date": "2018-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:09:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.src", "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.x86_64", "7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-4.el7ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0052" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.src", "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.x86_64", "7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-4.el7ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "redis: Heap corruption in lua_cmsgpack.c" }, { "cve": "CVE-2018-11219", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1590062" } ], "notes": [ { "category": "description", "text": "An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow in lua_struct.c:b_unpack()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.src", "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.x86_64", "7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-4.el7ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11219" }, { "category": "external", "summary": "RHBZ#1590062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590062" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11219", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11219" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11219", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11219" }, { "category": "external", "summary": "http://antirez.com/news/119", "url": "http://antirez.com/news/119" } ], "release_date": "2018-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:09:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.src", "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.x86_64", "7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-4.el7ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0052" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.src", "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.x86_64", "7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-4.el7ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "redis: Integer overflow in lua_struct.c:b_unpack()" }, { "cve": "CVE-2018-12326", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2018-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1594291" } ], "notes": [ { "category": "description", "text": "The Redis command line tool \u0027redis-cli\u0027 is vulnerable to a buffer overflow through the -h (host) command line parameter. The redis-cli may be used by other services; if these services do not adequately filter the host input it could lead to code execution with the privilege level of that service.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Code execution in redis-cli via crafted command line arguments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.src", "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.x86_64", "7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-4.el7ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12326" }, { "category": "external", "summary": "RHBZ#1594291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12326", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12326" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12326", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12326" } ], "release_date": "2018-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:09:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.src", "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.x86_64", "7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-4.el7ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0052" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.src", "7Server-RH7-RHOS-10.0:redis-0:3.0.6-4.el7ost.x86_64", "7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-4.el7ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "redis: Code execution in redis-cli via crafted command line arguments" } ] }
icsma-21-187-01
Vulnerability from csaf_cisa
Published
2021-07-06 00:00
Modified
2022-04-05 00:00
Summary
Philips Vue PACS (Update B)
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could allow an unauthorized person or process to eavesdrop, view or modify data, gain system access, perform code execution, install unauthorized software, or affect system data integrity in such a way as to negatively impact the confidentiality, integrity, or availability of the system.
Critical infrastructure sectors
Healthcare and Public Health
Countries/areas deployed
Worldwide
Company headquarters location
Netherlands
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "names": [ "Antonio Kulhanek" ], "summary": "reporting CVE-2021-39369 to Philips" }, { "organization": "Philips", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an unauthorized person or process to eavesdrop, view or modify data, gain system access, perform code execution, install unauthorized software, or affect system data integrity in such a way as to negatively impact the confidentiality, integrity, or availability of the system.", "title": "Risk evaluation" }, { "category": "other", "text": "Healthcare and Public Health", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Netherlands", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSMA-21-187-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsma-21-187-01.json" }, { "category": "self", "summary": "ICS Advisory ICSMA-21-187-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-21-187-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Philips Vue PACS (Update B)", "tracking": { "current_release_date": "2022-04-05T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSMA-21-187-01", "initial_release_date": "2021-07-06T00:00:00.000000Z", "revision_history": [ { "date": "2021-07-06T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSMA-21-187-01 Philips Vue PACS" }, { "date": "2022-01-20T00:00:00.000000Z", "legacy_version": "A", "number": "2", "summary": "ICSMA-21-187-01 Philips Vue PACS (Update A)" }, { "date": "2022-04-05T00:00:00.000000Z", "legacy_version": "B", "number": "3", "summary": "ICSMA-21-187-01 Philips Vue PACS (Update B)" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 12.2.x.x", "product": { "name": "Vue PACS: Versions 12.2.x.x and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Vue PACS" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 12.2.1.5", "product": { "name": "Vue Motion: Versions 12.2.1.5 and prior", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Vue Motion" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 12.2.x.x", "product": { "name": "Vue MyVue: Versions 12.2.x.x and prior", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Vue MyVue" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 12.2.x.x", "product": { "name": "Vue Speech: Versions 12.2.x.x and prior", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Vue Speech" } ], "category": "vendor", "name": "Philips" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-1938", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. CVE-2020-1938 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1938" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2018-12326", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This vulnerability exists within a third party software component (Redis). CVE-2018-12326 and CVE-2018-11218 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-12326" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-11218" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2018-11218", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct. This vulnerability exists within a third party software component (Redis). CVE-2020-4670 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-4670" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2020-4670", "cwe": { "id": "CWE-1188", "name": "Insecure Default Initialization of Resource" }, "notes": [ { "category": "summary", "text": "The software initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure. CVE-2018-8014 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-8014" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2018-8014", "cwe": { "id": "CWE-324", "name": "Use of a Key Past its Expiration Date" }, "notes": [ { "category": "summary", "text": "The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key. CVE-2021-33020 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33020" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2021-33020", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used. This vulnerability exists within a third party software component (7-Zip). CVE-2018-10115 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10115" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2018-10115", "cwe": { "id": "CWE-710", "name": "Improper Adherence to Coding Standards" }, "notes": [ { "category": "summary", "text": "The software does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities. CVE-2021-27501 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27501" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2021-27501", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information. CVE-2021-33018 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33018" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2021-33018", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "summary", "text": "The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. CVE-2021-27497 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27497" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2021-27497", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "Weaknesses in this category is related to a software system\u0027s data integrity components. This vulnerability exists within a third party software component (Oracle Database). CVE-2012-1708 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1708" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2012-1708", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in an output used as a webpage that is served to other users. CVE-2015-9251 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-9251" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2015-9251", "cwe": { "id": "CWE-707", "name": "Improper Neutralization" }, "notes": [ { "category": "summary", "text": "The product does not ensure or incorrectly ensures structured messages or data are well formed and that certain security properties are met before being read from an upstream component or sent to a downstream component. CVE-2021-27493 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27493" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2021-27493", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "notes": [ { "category": "summary", "text": "The software does not properly handle when an input contains Unicode encoding. CVE-2019-9636 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9636" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2019-9636", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "The product transmits or stores authentication credentials, but it uses an insecure method susceptible to unauthorized interception and/or retrieval. CVE-2021-33024 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33024" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2021-33024", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "The software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. CVE-2021-33022 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33022" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] }, { "cve": "CVE-2021-33022", "cwe": { "id": "CWE-23", "name": "Relative Path Traversal" }, "notes": [ { "category": "summary", "text": "The VideoStream function allows authenticated users access to files stored outside the web root. CVE-2021-39369 has been assigned to this vulnerability. A CVSS v3 base score of 2.7 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39369" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.", "product_ids": [ "CSAFPID-0001" ], "url": "https://incenter.medical.philips.com/" }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below.", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips released a security fix for Speech in Nov 2021 that remediates CWE-665 and CWE-327 and recommends contacting support below.", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Philips released version 12.2.1.6 in December 2021 for VuePAC (WFM), Vue Motion (Enterprise Viewer), Vue Explorer, and Web System Configuration that remediates CWE-23.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for MyVue that remediates CWE-665 and CWE-710 and recommends contacting support below.", "product_ids": [ "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Philips released Version 12.2.8.100 in Q1 / 2022 for PACS that remediates CWE-79, CWE-693, CWE-665, CWE-1188, CWE-327, CWE-176, CWE-522, CWE-710, and CWE-707 and recommends contacting support below.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Philips will release a fix for PACS that remediates CWE-522 with low score of 3.7 in Q3 2023.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://eservice.philips.com/Account/Login?returnUrl=%2F" }, { "category": "vendor_fix", "details": "The Philips advisory is available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "http://www.philips.com/productsecurity" }, { "category": "vendor_fix", "details": "Please see the Philips product security website for the latest security information for Philips products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] } ] }
gsd-2018-11218
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-11218", "description": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.", "id": "GSD-2018-11218", "references": [ "https://www.suse.com/security/cve/CVE-2018-11218.html", "https://www.debian.org/security/2018/dsa-4230", "https://access.redhat.com/errata/RHSA-2019:1860", "https://access.redhat.com/errata/RHSA-2019:0094", "https://access.redhat.com/errata/RHSA-2019:0052", "https://advisories.mageia.org/CVE-2018-11218.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-11218" ], "details": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.", "id": "GSD-2018-11218", "modified": "2023-12-13T01:22:42.034160Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11218", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "104553", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104553" }, { "name": "https://github.com/antirez/redis/issues/5017", "refsource": "MISC", "url": "https://github.com/antirez/redis/issues/5017" }, { "name": "DSA-4230", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4230" }, { "name": "RHSA-2019:0052", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0052" }, { "name": "https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0", "refsource": "MISC", "url": "https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0" }, { "name": "http://antirez.com/news/119", "refsource": "MISC", "url": "http://antirez.com/news/119" }, { "name": "https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3", "refsource": "MISC", "url": "https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3" }, { "name": "RHSA-2019:0094", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0094" }, { "name": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES", "refsource": "MISC", "url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES" }, { "name": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES", "refsource": "MISC", "url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "RHSA-2019:1860", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1860" }, { "name": "GLSA-201908-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-04" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.0.10", "versionStartIncluding": "4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.12", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redislabs:redis:5.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11218" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES" }, { "name": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES" }, { "name": "https://github.com/antirez/redis/issues/5017", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/antirez/redis/issues/5017" }, { "name": "https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0" }, { "name": "https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3", "refsource": "MISC", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3" }, { "name": "http://antirez.com/news/119", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://antirez.com/news/119" }, { "name": "DSA-4230", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4230" }, { "name": "104553", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104553" }, { "name": "RHSA-2019:0094", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0094" }, { "name": "RHSA-2019:0052", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0052" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "Patch" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "RHSA-2019:1860", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2019:1860" }, { "name": "GLSA-201908-04", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201908-04" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2021-08-04T17:14Z", "publishedDate": "2018-06-17T17:29Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.