Hash: SHA256

Package        : redis
Version        : 2:2.4.14-1+deb7u2
CVE ID         : CVE-2016-1051

It was discovered that there was a "Cross Protocol Scripting" attack in
the Redis key-value database.

"POST" and "Host:" command strings (which are not valid in the Redis
protocol) were not immediately rejected when an attacker makes HTTP
request to the Redis TCP port.

For Debian 7 "Wheezy", this issue has been fixed in redis version
2:2.4.14-1+deb7u2.

We recommend that you upgrade your redis packages.


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

Debian LTS: DLA-1161-1: redis security update

November 5, 2017
It was discovered that there was a "Cross Protocol Scripting" attack in the Redis key-value database

Summary

"POST" and "Host:" command strings (which are not valid in the Redis
protocol) were not immediately rejected when an attacker makes HTTP
request to the Redis TCP port.

For Debian 7 "Wheezy", this issue has been fixed in redis version
2:2.4.14-1+deb7u2.

We recommend that you upgrade your redis packages.


Regards,

- --
,''`.
: :' : Chris Lamb
`. `'` lamby@debian.org / chris-lamb.co.uk
`-



Severity
Package : redis
Version : 2:2.4.14-1+deb7u2
CVE ID : CVE-2016-1051

Related News